Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: Booz Allen Hamilton
Booz Allen Hamilton's Steve Radick discusses a recent blog post.
Host Larry Allen explores this topic with Maria Darby of Booz Allen Hamilton and Brooks Holtom of the McDonough School of Business.
June 29, 2010
Learn more in today's cybersecurity update.
How can the federal government attract the best and the brightest workers to develop the strongest cyber workforce on the planet? Hint: it's not just about hiring those with computer skills. We get details about a recent report from Booz Allen Hamilton and the Partnership for Public Service.
Steve Radick of Booz Allen Hamilton has some ideas.
Michael Isman, principal at Booz Allen Hamilton, explains what you need to know as a CIO.
Wednesday, November 11th, 2009 at 2:05pm
Identity Theft is a multifaceted problem that has grown to epidemic proportions with the development of the internet and of the on-line economy.
Tags: technology , Booz Allen Distinguished Speaker Series , Kathleen Walter , IRS , Richard Power , CyLab , Carnegie Mellon University , Calivin Sneed , Blue Cross Blue Shield Association , Kennethe Jenkins , US Secret Service , cyber crime , identity theft
Thursday, December 17th, 2009 at 2:05pm
In the growing on-line world of quick and unmonitored transactions and communications, virtual identities have become common elements of people's daily lives creating limitless opportunities for criminals to recruit, launder their money, and communicate under the cloak of anonymity. A panel of leading government experts discuss the way that our adversaries use these systems and how organizations can better prepare for the threats they are facing. From a commercial, law enforcement and security perspective, panelists will explain the scope of the problems and the potential benefits that can be derived from new social media
Tags: technology , Booz Allen Distinguished Speaker Series , Virtual Identity , cyber , crime , James A. Lewis , Dr. Reobert E. Young , Roy D. Dotson , Secret Service , Department of Homeland Security , Gary Cubbage ,
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , identity management , Access Control , Booz Allen , identity theft , privacy , Identity Data , smart card , Virtual Identity , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PKI , PACS , LACS , RBAC , information synchronization , HSPD-12 , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , auditing , logging , reporting , CAC , Common Access Card , compliance , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation