Shows & Panels
- Accelerate and Streamline for Better Customer Service
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Client Virtualization Solutions
- Data Protection in a Virtual World
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Feds in the Cloud
- Health IT: A Policy Change Agent
- Improving Healthcare Outcomes through IT Policy
- IT Innovation in the New Era of Government
- Making Dollars And Sense Out of Data Center Consolidation
- Navigating the Private Cloud
- One Step to the Cloud, Two Steps Toward Innovation
- Path to FDCCI Compliance
- Take Command of Your Mobility Initiative
Shows & Panels
Search Tags: HSPD-12
Cyber coordinator Schmidt says the administration will issue a draft national strategy for secure online transactions by Friday. The goal is to make identity management easy to use, secure and interoperable to conduct business with the government and the private sector. Schmidt says transactions are key to everything the White House wants to do.
The military is performing a proof of concept in Utah by putting transit benefits on employees' Common Access Cards. USDA is implementing technology to require the use of HSPD-12 cards to log onto applications.
Phase 1 has already begun in expanding telework in the federal government.
OMB will issue a new memo on HSPD-12 in the coming weeks. Agencies are feeling more pressure to meet the secure identity card requirements. Administration is also closer to finalizing new strategy for securing online transactions.
Tags: technology , Paul Grant , Mike Butler , DoD , VA , DOT , SBA , Interagency Smart Card Advisory Board , OMB , CIO Council , Committee on National Security Systems , TechStat , Secure identity , Identity, credential and access management , Secure online transactions strategy
More than 3.3 million agency employees now have secure ID cards. The CIO Council also releases new roadmap and implementation guidance for identity and access management. The guidance is intended to bring several governmentwide efforts together under one initiative.
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , identity management , Access Control , Booz Allen , identity theft , privacy , Identity Data , smart card , Virtual Identity , Booz Allen Hamilton , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PKI , PACS , LACS , RBAC , information synchronization , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , auditing , logging , reporting , CAC , Common Access Card , compliance , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation
New guidance provides advice to ensure non-federally issued identity cards can work with federal HSPD-12 cards and systems.
CIO Council offers advice on improving agency input on IT security