Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: Common Access Card
As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.
Tags: DoD , technology , mobile computing , Bring your own device , identity management , public key infrastructure , DISA , DMDC , Marine Corps , Greg Youst , Michael Butler , Rob Anderson , AFCEA , Jared Serbu
A look at the events shaping cybersecurity policy in the federal government over the past six years.
Jeff Ait, director of Public Sector for Good Technology will talk about how his company can help you manage the mobile phones and tablets at your agency.
June 5, 2012
The Defense Information Systems Agency created a Defense-wide directory of email addresses in support of their enterprise email system. But the real value in the listing of every military and civilian employee, contractor and retiree email address may be in securing information in a new way through the use of access based identity management. NIST is testing how to best use secure identity cards in the cloud.
Randy Vanderhoof, the executive director of the Smart Card Alliance, joined In Depth with Francis Rose to talk about a potential cybersecurity vulnerability with the Defense Department's Common Access Card.
Biometrics, more card memory giving military more options. In the future, employees may be able to use federal ID cards on metro.
The Defense Department is looking for the same benefits from RFID as Wal-Mart.
The Defense Department is creating identity and access management tools as an enterprise service across the department. One possible way ahead, leaders say, is a single authoritative digital identity system the Defense Information Systems Agency created to support the Army's move to enterprise email.
The Defense Department is making the Pentagon's physical access control system accept Common Access Cards. Currently, people who work at the Defense headquarters and other facilities must carry two secure identity cards. The Army also will test giving smart cards to retirees.
Tags: technology , DoD , Mary Dixon , Pentagon Force Protection Agency , Defense Manpower Data Center , Army , Interagency Smartcard Advisory Board , secure identity card , physical access control , identity management , HSPD-12 , Jason Miller
The military issued its first secure identity card just about 10 years ago and now it's a part of the department's culture. The Pentagon is looking at how to expand the use of the Common Access Card to include transit benefits and electronic purse capabilities. The card, however, almost didn't get past the first pilot.