Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: identity management
As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.
Tags: DoD , technology , mobile computing , Bring your own device , Common Access Card , public key infrastructure , DISA , DMDC , Marine Corps , Greg Youst , Michael Butler , Rob Anderson , AFCEA , Jared Serbu
Jim Williams, vice president at DAON, and Conor White, the president of the DAO division, X-Products, will discuss the changing world of identity management in the federal workspace.
October 1, 2013
Tags: technology , cloud computing , Jim Williams , Daon , Conor White , X factor , information technology , NIST , identity theft , passwords , smart phones , mobile technology , face recognition technology , John Gilroy , Federal Tech Talk
SecureKey Technologies will build a portal in the cloud to handle the identity management process and connect one username or password or digital certificate to many services. The contract is worth $15.1 million over three years.
Tags: technology , cloud computing , USPS , Naomi Lefkovitz , NIST , National Strategy for Trusted Identities in Cyberspace , SecureKey Technologies , industry , contracting , Federal Cloud Credential Exchange , Jason Miller
Inside the Reporter's Notebook: A new job for a former VA senior official; Countdown to cloud credential pilot begins
News and buzz in the acquisition and IT communities that you may have missed this week.
Tags: technology , acquisition , Scott Gould , Veterans Affairs Department , CareFirst , cloud computing , USPS , DoD , Frank Kendall , Better Buying Power , OMB , OSTP , Dominic Sale , Nick Sinai , open government , open data , Inside the Reporters Notebook , Jason Miller
The Homeland Security Department released a draft performance work statement to vendors. The draft PWS details DHS' needs to use HSPD-12 cards for computer network and building access.
Phillip Soloweszyk, director of Identity and Windows Consulting Services for Quest Software, will discuss identity management.
APril 16, 2013
The Postal Service issued a draft solicitation for the Federal Cloud Credential Exchange. The goal is to create a cloud-based service to perform identity authentication and verification. Agencies could plug into the service, integrating it with any application that adheres to the standards.
A memo from federal CIO Steven VanRoekel requires agencies to begin accepting usernames and passwords from commercial companies such as Verisign or Google. This is the second time the government has tried to accept commercial credentials. Experts say this time agencies and industry are better prepared to be successful.
Tags: technology , OMB , NIH , SSA , GSA , Moira Mack , Judy Spencer , Frank Baitman , Steven Van Roekel , Randy Vanderhoof , smartcard alliance , open id standards , HSPD-12 , Jason Miller , CertiPath
The two agencies met this week to figure out how best to implement the recommendations in a white paper from ACT-IAC. The approach detailed in the document follows closely the methodology used to develop the NIEM and FICAM standards.
From digitization of mail to GPS tracking, the Postal Service is investing in new technologies to help it grow revenue. Ellis Burgoyne, the agency's chief information officer, says his department is concentrating on five main projects in 2013 that will help the Postal Service cut costs while improving efficiency and customer service. USPS ended fiscal 2012 with $15.9 billion of debt.