Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: NIST
Jim Williams, vice president at DAON, and Conor White, the president of the DAO division, X-Products, will discuss the changing world of identity management in the federal workspace.
October 1, 2013
Tags: technology , cloud computing , identity management , Jim Williams , Daon , Conor White , X factor , information technology , identity theft , passwords , smart phones , mobile technology , face recognition technology , John Gilroy , Federal Tech Talk
The preliminary version of the framework will be published in mid-October, followed by several months of public comment. NIST plans a final release of the voluntary framework in February.
SecureKey Technologies will build a portal in the cloud to handle the identity management process and connect one username or password or digital certificate to many services. The contract is worth $15.1 million over three years.
Tags: technology , identity management , cloud computing , USPS , Naomi Lefkovitz , National Strategy for Trusted Identities in Cyberspace , SecureKey Technologies , industry , contracting , Federal Cloud Credential Exchange , Jason Miller
The departments of Commerce, Homeland Security and Treasury submitted suggestions to the White House on what incentives the government can offer to induce critical infrastructure providers to use the cybersecurity framework to improve their systems and networks. NIST is leading an effort to develop the framework with industry.
NIST and the National Cybersecurity Center of Excellece (NCCoE) want to facilitate public-private collaborations surrounding cybersecurity solutions by creating a new research-and-development center.
Alex Grohmann and John Dyson from the Northern Virginia Chapter of the Informations Systems Security Association, join host John Gilroy to talk about what you can do to make your agency more secure.
July 9, 2013
Tags: technology , FedRAMP , IT security , cloud computing , Information Systems Security Association , ISSA NOVA , Alex Grohmann , Morgan Franklin , John Dyson , Deloitte , continuous monitoring , NIST 800-53 , NIST special publication 800-53 Rev 4 , information technology , John Gilroy , Federal Tech Talk
Department will move away from DoD-specific approaches to cybersecurity, lean more toward informing and relying on governmentwide efforts.
DHS, DISA and GSA are heading down similar but different paths to ensure mobile apps are secure before being allowed on devices or networks. NIST is developing voluntary guidelines to improve mobile software security based on work done in other industry sectors.
In an effort to incorporate iris, facial and fingerprint recognition technologies across the government, the House Oversight and Government Reform Subcommittee pressed the National Institute of Standards and Technology to set a date for the release of national biometric recognition standards.