Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: identity management
The Postal Service will kick off its pilot to provide identity management services in the cloud in early 2014. The IRS and DHS also are pursuing complimentary initiatives to authorize and authenticate users.
Employees at the departments of Treasury, Homeland Security and State can use their HSPD-12 smart cards to log onto the intelligence community's unclassified sharing platform. Most recently, the departments of Health and Human Services, Veterans Affairs and the Justice Department's Bureau of Alcohol, Tobacco, Firearms and Explosives will have access to the tools and applications through their smart identity cards.
Paul Christman, vice president Public Sector at Dell Software, discusses how his company can help you solve identity management issues at your agency.
December 10, 2013
Through the back-end attribute exchange, agencies can have a standard way for different organizations to safely and securely share sensitive information. The Justice Department conducted a pilot earlier this year and found success with state and local law enforcement agencies accessing the Regional Information Sharing System.
Listen Tuesday, November 26th @ 12pm EST
Program will discuss the following: Progress Report on Identity Management Programs, Key Benefits with Identity Management Implementations,Key Challenges to Overcome, How do you Coordinate with State & Local Governments and A Vision for The Future and Future Applications.
As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.
Tags: DoD , technology , mobile computing , Bring your own device , Common Access Card , public key infrastructure , DISA , DMDC , Marine Corps , Greg Youst , Michael Butler , Rob Anderson , AFCEA , Jared Serbu
Jim Williams, vice president at DAON, and Conor White, the president of the DAO division, X-Products, will discuss the changing world of identity management in the federal workspace.
October 1, 2013
Tags: technology , cloud computing , Jim Williams , Daon , Conor White , X factor , information technology , NIST , identity theft , passwords , smart phones , mobile technology , face recognition technology , John Gilroy , Federal Tech Talk
SecureKey Technologies will build a portal in the cloud to handle the identity management process and connect one username or password or digital certificate to many services. The contract is worth $15.1 million over three years.
Tags: technology , cloud computing , USPS , Naomi Lefkovitz , NIST , National Strategy for Trusted Identities in Cyberspace , SecureKey Technologies , industry , contracting , Federal Cloud Credential Exchange , Jason Miller
Inside the Reporter's Notebook: A new job for a former VA senior official; Countdown to cloud credential pilot begins
News and buzz in the acquisition and IT communities that you may have missed this week.
Tags: technology , acquisition , Scott Gould , Veterans Affairs Department , CareFirst , cloud computing , USPS , DoD , Frank Kendall , Better Buying Power , OMB , OSTP , Dominic Sale , Nick Sinai , open government , open data , Inside the Reporters Notebook , Jason Miller
The Homeland Security Department released a draft performance work statement to vendors. The draft PWS details DHS' needs to use HSPD-12 cards for computer network and building access.