Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: PKI
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , White House , HSPD 12 , secure identity card , identity management , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller
White House cyber office working on strategy document to address issues around identity management. This is part of the administration's broader effort to better integrate all of these initiatives.
The White House is leading a new effort to secure online transactions across the federal, state and local governments and eventually in the private sector. The creation of the new document is being led by cybersecurity coordinator Howard Schmidt and includes DHS. It is one way the administration hopes to improve cybersecurity. OMB soon will release a new approach to measuring FISMA compliance.
Tags: technology , Vivek Kundra , Howard Schmidt , Diane Watson , Tom Lockwood , OMB , White House Cybersecurity Coordinator , House Oversight and Government Reform Committee , DHS , Defense , State , DOJ , Treasury , USPS , GPO , DEA , USPTO , FISMA , cybersecurity , National Strategy for Secure Online Transactions , Federal Bridge
The State Department in late January began testing the use of digital certificates on Microsoft Word and Excel documents, using the Group Policy Object function to digitally lock down Microsoft Office so employees does not use any macros that are not approved by State.
The agency teams up with the SAFE BioPharma Association to digitally sign documents and improve the time it takes to get clinical trials going. NCI and the association are using the standards developed by the Federal Bridge. The two organizations are putting the concepts in the National Strategy for Trusted Identities in Cyberspace (NSTIC) into practice.
White House strategy gives the Commerce Department bureau the ability to bring industry, privacy, security and other experts together to develop policies and standards. The administration made it clear the private sector will lead the effort and the government is only creating a marketplace for these services.
The military issued its first secure identity card just about 10 years ago and now it's a part of the department's culture. The Pentagon is looking at how to expand the use of the Common Access Card to include transit benefits and electronic purse capabilities. The card, however, almost didn't get past the first pilot.
Rob Carey, the Navy CIO, signs an electronic signature policy to let Navy offices move to online processes. Carey said the memo is not a mandate, but serves as a catalyst for program managers who believe it makes business sense to move processes away from paper
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , identity management , Access Control , Booz Allen , identity theft , privacy , Identity Data , smart card , Virtual Identity , Booz Allen Hamilton , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PACS , LACS , RBAC , information synchronization , HSPD-12 , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , auditing , logging , reporting , CAC , Common Access Card , compliance , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation