Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Booz Allen
John Thomas, Senior Vice President and Chief Systems Engineer at Booz Allen Hamilton, describes the company's training partnership with DAU.
Booz Allen's Steve Radick said the growth of Gov 2.0 is the top story of the year.
August 12th, 2010 at 11 AM
How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?
Tags: technology , Expert Voices presented by Booz Allen , Expert Voices , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , identity management , cybersecurity , cyber , cyberspace , Michael Farber , IT , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , NIST , Hilary Ward , Global Transaction Services
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , identity management , Access Control , identity theft , privacy , Identity Data , smart card , Virtual Identity , Booz Allen Hamilton , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PKI , PACS , LACS , RBAC , information synchronization , HSPD-12 , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , auditing , logging , reporting , CAC , Common Access Card , compliance , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation