Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: identity management
Phillip Soloweszyk, director of Identity and Windows Consulting Services for Quest Software, will discuss identity management.
APril 16, 2013
The Postal Service issued a draft solicitation for the Federal Cloud Credential Exchange. The goal is to create a cloud-based service to perform identity authentication and verification. Agencies could plug into the service, integrating it with any application that adheres to the standards.
A memo from federal CIO Steven VanRoekel requires agencies to begin accepting usernames and passwords from commercial companies such as Verisign or Google. This is the second time the government has tried to accept commercial credentials. Experts say this time agencies and industry are better prepared to be successful.
Tags: technology , OMB , NIH , SSA , GSA , Moira Mack , Judy Spencer , Frank Baitman , Steven Van Roekel , Randy Vanderhoof , smartcard alliance , open id standards , HSPD-12 , Jason Miller , CertiPath
The two agencies met this week to figure out how best to implement the recommendations in a white paper from ACT-IAC. The approach detailed in the document follows closely the methodology used to develop the NIEM and FICAM standards.
From digitization of mail to GPS tracking, the Postal Service is investing in new technologies to help it grow revenue. Ellis Burgoyne, the agency's chief information officer, says his department is concentrating on five main projects in 2013 that will help the Postal Service cut costs while improving efficiency and customer service. USPS ended fiscal 2012 with $15.9 billion of debt.
OPM developing competency models for performance improvement officers and chief operating officers as part of its requirements under the GPRA Modernization Act. DHS moves to agile development to fix the HSIN program. NIST to update HSPD-12 card requirements to meet mobile needs.
Tags: technology , GSA , OPM , NIST , DHS , Martha Johnson , Dave McClure , Patsy Stevens , Donna Roy , Jeremy Grant , NSTIC , Suzanne Lightman , green government , energy efficiency , open government , GPRA Modernization , HSIN , cybersecurity , mobile , HSPD-12 , Jason Miller , ELC 2011
Agency CIO Tony Trenkle said CMS is building the foundation for four enterprisewide applications, including identity management and an enterprise portal.
October 18, 2012
More than eight years after the White House issued Homeland Security Presidential Directive-12 requiring the issuance of secure identity cards, governmentwide and agency-specific initiatives provide hope the smart cards can be more than "glorified ID cards." NIST and GSA are developing an identity exchange in the cloud. DHS and IRS are putting their cards to use at a local level for both building and computer access.
Tags: technology , acquisition , Tom McCarty , DHS , Kshemendra Paul , Information Sharing Environment , Sharon James , IRS , Naomi Lefkovitz , NIST , cloud computing , information sharing , back-end attribute exchange , GSA , PortfolioStat , HSPD-12 , AFCEA Bethesda , ACT-IAC , standards based acquisition model , Jason Miller
The Defense Department and the intelligence community are working on joint data standards as they migrate toward enterprise IT environments. Both organizations also are implementing roles-based, access control to ensure secure information sharing.
Tags: DoD , intelligence community , GEOINT , Intelligence Community Information Technology Enterprise , Joint Information Environment , attribute-based access control , Rob Carey , Al Tarasiuk , James Clapper , Jared Serbu
The Information Sharing Environment is supporting a set of technology priories to promote the safe disclosure of data. In the ISE's annual report to Congress, it highlights the steps agencies have taken over the past year to move toward a culture of responsible and secure information sharing.
Tags: technology , management , Kshemendra Paul , Information Sharing Environment , WikiLeaks , information sharing , ODNI , Insider Threat Strategy , National Strategy for Infomation Sharing , NIEM , Supicious Activity Reporting standard , Jason Miller , FICAM ,