Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Common Access Card
A look at the events shaping cybersecurity policy in the federal government over the past six years.
Jeff Ait, director of Public Sector for Good Technology will talk about how his company can help you manage the mobile phones and tablets at your agency.
June 5, 2012
The Defense Information Systems Agency created a Defense-wide directory of email addresses in support of their enterprise email system. But the real value in the listing of every military and civilian employee, contractor and retiree email address may be in securing information in a new way through the use of access based identity management. NIST is testing how to best use secure identity cards in the cloud.
Randy Vanderhoof, the executive director of the Smart Card Alliance, joined In Depth with Francis Rose to talk about a potential cybersecurity vulnerability with the Defense Department's Common Access Card.
Biometrics, more card memory giving military more options. In the future, employees may be able to use federal ID cards on metro.
The Defense Department is looking for the same benefits from RFID as Wal-Mart.
The Defense Department is creating identity and access management tools as an enterprise service across the department. One possible way ahead, leaders say, is a single authoritative digital identity system the Defense Information Systems Agency created to support the Army's move to enterprise email.
The Defense Department is making the Pentagon's physical access control system accept Common Access Cards. Currently, people who work at the Defense headquarters and other facilities must carry two secure identity cards. The Army also will test giving smart cards to retirees.
Tags: technology , DoD , Mary Dixon , Pentagon Force Protection Agency , Defense Manpower Data Center , Army , Interagency Smartcard Advisory Board , secure identity card , physical access control , identity management , HSPD-12 , Jason Miller
The military issued its first secure identity card just about 10 years ago and now it's a part of the department's culture. The Pentagon is looking at how to expand the use of the Common Access Card to include transit benefits and electronic purse capabilities. The card, however, almost didn't get past the first pilot.
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , identity management , Access Control , Booz Allen , identity theft , privacy , Identity Data , smart card , Virtual Identity , Booz Allen Hamilton , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PKI , PACS , LACS , RBAC , information synchronization , HSPD-12 , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , auditing , logging , reporting , CAC , compliance , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation