Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: Identity management
The Defense Department is creating identity and access management tools as an enterprise service across the department. One possible way ahead, leaders say, is a single authoritative digital identity system the Defense Information Systems Agency created to support the Army's move to enterprise email.
White House strategy gives the Commerce Department bureau the ability to bring industry, privacy, security and other experts together to develop policies and standards. The administration made it clear the private sector will lead the effort and the government is only creating a marketplace for these services.
The Defense Department will begin taking Social Security numbers off of the ID cards held by DoD employees and retirees. The changes, part of a 2008 SSN reduction plan, will begin in June, officials said.
Fears that the leak of thousands of State Department memos to the website WikiLeaks would reverse progress on interagency sharing of national security information have not materialized, officials testified Thursday. Agencies have responded by recognizing the need to protect data rather than by hoarding it, they said.
Tags: DoD , Congress , technology , information sharing , State Department , Director of National Intelligence , James Clapper , Teri Takai , Corin Stone , Patrick Kennedy , WikiLeaks , Joseph Lieberman , Susan Collins , Senate Homeland Security and Governmental Affairs , identity management , secure identity cards , CACs , public key infrastructure , SIPRNet , Jared Serbu
The Defense Department is making the Pentagon's physical access control system accept Common Access Cards. Currently, people who work at the Defense headquarters and other facilities must carry two secure identity cards. The Army also will test giving smart cards to retirees.
Tags: technology , DoD , Mary Dixon , Pentagon Force Protection Agency , Defense Manpower Data Center , Army , Interagency Smartcard Advisory Board , secure identity card , Common Access Card , physical access control , identity management , HSPD-12 , Jason Miller
The military issued its first secure identity card just about 10 years ago and now it's a part of the department's culture. The Pentagon is looking at how to expand the use of the Common Access Card to include transit benefits and electronic purse capabilities. The card, however, almost didn't get past the first pilot.
The long-awaited memo requires agencies to develop a plan to implement physical and computer network access controls. DHS and GSA are also working together to help agencies improve physical access control.
The memo is part of a broader effort to improve authentication to computers and buildings across government using secure identity cards. The White House also is close to finalizing the National Strategy for Trusted Identities in Cyberspace. President Obama could sign the strategy this winter.
Tags: technology , Phil Reitinger , Ari Schwartz , DHS , GSA , NIST , OMB , TechAmerica , identity management , HSPD-12 , cybersecurity , National Strategy for Trusted Identities in Cybers , Jason Miller
August 12th, 2010 at 11 AM
How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?
Tags: technology , Expert Voices presented by Booz Allen , Booz Allen , Expert Voices , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , identity management , cybersecurity , Cyber , cyberspace , Michael Farber , IT , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , NIST , Hilary Ward , Global Transaction Services