Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: identity management
The Defense Department will begin taking Social Security numbers off of the ID cards held by DoD employees and retirees. The changes, part of a 2008 SSN reduction plan, will begin in June, officials said.
Fears that the leak of thousands of State Department memos to the website WikiLeaks would reverse progress on interagency sharing of national security information have not materialized, officials testified Thursday. Agencies have responded by recognizing the need to protect data rather than by hoarding it, they said.
Tags: DoD , Congress , technology , information sharing , State Department , Director of National Intelligence , James Clapper , Teri Takai , Corin Stone , Patrick Kennedy , WikiLeaks , Joseph Lieberman , Susan Collins , Senate Homeland Security and Governmental Affairs , secure identity cards , CACs , public key infrastructure , SIPRNet , Jared Serbu
The Defense Department is making the Pentagon's physical access control system accept Common Access Cards. Currently, people who work at the Defense headquarters and other facilities must carry two secure identity cards. The Army also will test giving smart cards to retirees.
Tags: technology , DoD , Mary Dixon , Pentagon Force Protection Agency , Defense Manpower Data Center , Army , Interagency Smartcard Advisory Board , secure identity card , Common Access Card , physical access control , HSPD-12 , Jason Miller
The military issued its first secure identity card just about 10 years ago and now it's a part of the department's culture. The Pentagon is looking at how to expand the use of the Common Access Card to include transit benefits and electronic purse capabilities. The card, however, almost didn't get past the first pilot.
The long-awaited memo requires agencies to develop a plan to implement physical and computer network access controls. DHS and GSA are also working together to help agencies improve physical access control.
The memo is part of a broader effort to improve authentication to computers and buildings across government using secure identity cards. The White House also is close to finalizing the National Strategy for Trusted Identities in Cyberspace. President Obama could sign the strategy this winter.
August 12th, 2010 at 11 AM
How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?
Tags: technology , Expert Voices presented by Booz Allen , Booz Allen , Expert Voices , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , cybersecurity , Cyber , cyberspace , Michael Farber , IT , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , NIST , Hilary Ward , Global Transaction Services
IG: pilot information is at risk, Billions to be spent on smartgrid cybersecurity
Tags: Federal Drive , Cybersecurity Update , White House , cybersecurity , National Strategy for Trusted Identities in Cybers , FAA , contracting , Pike Research , CyberSecurity Seminars , Tom Billington
Cyber coordinator Schmidt says the administration will issue a draft national strategy for secure online transactions by Friday. The goal is to make identity management easy to use, secure and interoperable to conduct business with the government and the private sector. Schmidt says transactions are key to everything the White House wants to do.