Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: identity management
The Homeland Security Department released a draft performance work statement to vendors. The draft PWS details DHS' needs to use HSPD-12 cards for computer network and building access.
Phillip Soloweszyk, director of Identity and Windows Consulting Services for Quest Software, will discuss identity management.
APril 16, 2013
The Postal Service issued a draft solicitation for the Federal Cloud Credential Exchange. The goal is to create a cloud-based service to perform identity authentication and verification. Agencies could plug into the service, integrating it with any application that adheres to the standards.
A memo from federal CIO Steven VanRoekel requires agencies to begin accepting usernames and passwords from commercial companies such as Verisign or Google. This is the second time the government has tried to accept commercial credentials. Experts say this time agencies and industry are better prepared to be successful.
Tags: technology , OMB , NIH , SSA , GSA , Moira Mack , Judy Spencer , Frank Baitman , Steven Van Roekel , Randy Vanderhoof , smartcard alliance , open id standards , HSPD-12 , Jason Miller , CertiPath
The two agencies met this week to figure out how best to implement the recommendations in a white paper from ACT-IAC. The approach detailed in the document follows closely the methodology used to develop the NIEM and FICAM standards.
From digitization of mail to GPS tracking, the Postal Service is investing in new technologies to help it grow revenue. Ellis Burgoyne, the agency's chief information officer, says his department is concentrating on five main projects in 2013 that will help the Postal Service cut costs while improving efficiency and customer service. USPS ended fiscal 2012 with $15.9 billion of debt.
OPM developing competency models for performance improvement officers and chief operating officers as part of its requirements under the GPRA Modernization Act. DHS moves to agile development to fix the HSIN program. NIST to update HSPD-12 card requirements to meet mobile needs.
Tags: technology , GSA , OPM , NIST , DHS , Martha Johnson , Dave McClure , Patsy Stevens , Donna Roy , Jeremy Grant , NSTIC , Suzanne Lightman , green government , energy efficiency , open government , GPRA Modernization , HSIN , Cybersecurity , mobile , HSPD-12 , Jason Miller , ELC 2011
Agency CIO Tony Trenkle said CMS is building the foundation for four enterprisewide applications, including identity management and an enterprise portal.
October 18, 2012
More than eight years after the White House issued Homeland Security Presidential Directive-12 requiring the issuance of secure identity cards, governmentwide and agency-specific initiatives provide hope the smart cards can be more than "glorified ID cards." NIST and GSA are developing an identity exchange in the cloud. DHS and IRS are putting their cards to use at a local level for both building and computer access.
Tags: technology , acquisition , Tom McCarty , DHS , Kshemendra Paul , Information Sharing Environment , Sharon James , IRS , Naomi Lefkovitz , NIST , cloud computing , information sharing , back-end attribute exchange , GSA , PortfolioStat , HSPD-12 , AFCEA Bethesda , ACT-IAC , standards based acquisition model , Jason Miller
The Defense Department and the intelligence community are working on joint data standards as they migrate toward enterprise IT environments. Both organizations also are implementing roles-based, access control to ensure secure information sharing.
Tags: DoD , intelligence community , GEOINT , Intelligence Community Information Technology Enterprise , Joint Information Environment , attribute-based access control , Rob Carey , Al Tarasiuk , James Clapper , Jared Serbu