Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: identity management
Michael Daniel, the Obama administration's cybersecurity coordinator, says he wants to dismantle the most common method of cyber protection: passwords. Even as cyber threats continue to grow more sophisticated and destructive, passwords are weakening and proving easier to crack than ever. The solution lies in the National Strategy for Trusted Identities in Cyberspace (NSTIC), which calls for a broad "identity ecosystem" to replace simple passwords.
The Postal Service will kick off its pilot to provide identity management services in the cloud in early 2014. The IRS and DHS also are pursuing complimentary initiatives to authorize and authenticate users.
The Homeland Security Department upgraded its Homeland Security Information Network (HSIN) last year with new security and identity management features. The growing acceptance and use of standards is making it easier for state, local, tribal government and other partners to securely access law enforcement data.
Employees at the departments of Treasury, Homeland Security and State can use their HSPD-12 smart cards to log onto the intelligence community's unclassified sharing platform. Most recently, the departments of Health and Human Services, Veterans Affairs and the Justice Department's Bureau of Alcohol, Tobacco, Firearms and Explosives will have access to the tools and applications through their smart identity cards.
Paul Christman, vice president Public Sector at Dell Software, discusses how his company can help you solve identity management issues at your agency.
December 10, 2013
Through the back-end attribute exchange, agencies can have a standard way for different organizations to safely and securely share sensitive information. The Justice Department conducted a pilot earlier this year and found success with state and local law enforcement agencies accessing the Regional Information Sharing System.
Listen Tuesday, November 26th @ 12pm EST
Program will discuss the following: Progress Report on Identity Management Programs, Key Benefits with Identity Management Implementations,Key Challenges to Overcome, How do you Coordinate with State & Local Governments and A Vision for The Future and Future Applications.
As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.
Tags: DoD , technology , mobile computing , Bring your own device , Common Access Card , public key infrastructure , DISA , DMDC , Marine Corps , Greg Youst , Michael Butler , Rob Anderson , AFCEA , Jared Serbu
Jim Williams, vice president at DAON, and Conor White, the president of the DAO division, X-Products, will discuss the changing world of identity management in the federal workspace.
October 1, 2013
Tags: technology , cloud computing , Jim Williams , Daon , Conor White , X factor , information technology , NIST , identity theft , passwords , smart phones , mobile technology , face recognition technology , John Gilroy , Federal Tech Talk
SecureKey Technologies will build a portal in the cloud to handle the identity management process and connect one username or password or digital certificate to many services. The contract is worth $15.1 million over three years.
Tags: technology , cloud computing , USPS , Naomi Lefkovitz , NIST , National Strategy for Trusted Identities in Cyberspace , SecureKey Technologies , industry , contracting , Federal Cloud Credential Exchange , Jason Miller