Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
Shows & Panels
Search Tags: NSTIC
Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.
In this edition of Inside the Reporter's Notebook, Executive Editor Jason Miller shares news and buzz about the IT and acquisition communities. GSA and SBA continue their ongoing quarrel over the Office Supplies 3 contract, and April marks the three-year anniversary of NSTIC's release.
OPM developing competency models for performance improvement officers and chief operating officers as part of its requirements under the GPRA Modernization Act. DHS moves to agile development to fix the HSIN program. NIST to update HSPD-12 card requirements to meet mobile needs.
Tags: technology , gsa , OPM , NIST , DHS , Martha Johnson , Dave McClure , Patsy Stevens , Donna Roy , Jeremy Grant , Suzanne Lightman , green government , energy efficiency , open government , GPRA Modernization , HSIN , Cybersecurity , identity management , mobile , HSPD-12 , jason miller , ELC 2011
The General Services Administration will hold a vendor day Aug. 7 in Washington, D.C. The concept of identity management in the cloud builds on the efforts included in the National Strategy for Trusted Identities in Cyberspace (NSTIC).
A working group is developing common requirements for a federated cloud identity management shared service. NIH already showed how this could be done with its iTrust tools. The tiger team is expected to issue the common standards in the next few months.
Jeremy Grant, the senior advisor for National Strategy for Trusted Identities in Cyberspace, said his group is about to award a contract to manage a future set of working groups, each of which will develop a component of the ID ecosystem.
The agency will fund five-to-eight projects between $1.25 million and $2 million for up to two years. The pilot programs will cover NSTIC's four principles to make identity management secure, interoperable, privacy-enhancing and cost effective.
Steve Vinsik, vice president and partner, Global Security Solutions for Unisys Corporation, joins host John Gilroy to talk about biometrics, border protection, air cargo, and telework.
January 3, 2012
Tags: technology , Unisys , biometrics , border protection , telework , biometric security , Unisys Security Index , malware , Steve Vinsik , John Gilroy , Federal Tech Talk , cloud computing , cyber security
Federal News Radio's Jason Miller offers his top stories of 2011 and predictions for 2012.
Tags: technology , acquisition , 2011 and Beyond , jason miller , Dan Gordon , Cybersecurity , acquisition workforce , shared services , cloud computing , mobile , open government , HSPD-12 , identity management , E-Government Fund
The agency teams up with the SAFE BioPharma Association to digitally sign documents and improve the time it takes to get clinical trials going. NCI and the association are using the standards developed by the Federal Bridge. The two organizations are putting the concepts in the National Strategy for Trusted Identities in Cyberspace (NSTIC) into practice.