Shows & Panels
- AFCEA Answers
- Ask the CIO
- The Big Data Dilemma
- Carrying On with Continuity of Operations
- Connected Government
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Cyber Imperative
- Cyber Solutions for 2013 and Beyond
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Expert Voices
- Federal Executive Forum
- Federal IT Challenge
- Federal Tech Talk
- Mission-critical Apps in the Cloud
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- The Real Deal on Digital Government
- The Reality of Continuous Monitoring... Is Your Agency Secure?
- Veterans in Private Sector: Making the Transition
Shows & Panels
Search Tags: identity management
IG: pilot information is at risk, Billions to be spent on smartgrid cybersecurity
Tags: Federal Drive , Cybersecurity Update , White House , cybersecurity , National Strategy for Trusted Identities in Cybers , FAA , contracting , Pike Research , CyberSecurity Seminars , Tom Billington
Cyber coordinator Schmidt says the administration will issue a draft national strategy for secure online transactions by Friday. The goal is to make identity management easy to use, secure and interoperable to conduct business with the government and the private sector. Schmidt says transactions are key to everything the White House wants to do.
Department to lead the roll out of a federated identity management system for all law enforcement agencies. Justice ran a pilot and now plans on expanding the system nationwide by the end of 2010. The goal is to use technology that already exists and focus on standards and policies.
President appoints Mike Resnick to be the new senior director for information sharing policy. Congress questions how the White House position will mesh with the Program Manager for the Information Sharing Environment.
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , Access Control , Booz Allen , identity theft , privacy , Identity Data , smart card , Virtual Identity , Booz Allen Hamilton , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PKI , PACS , LACS , RBAC , information synchronization , HSPD-12 , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , auditing , logging , reporting , CAC , Common Access Card , compliance , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation
Watch and listen On Demand Below
Watch or listen to this program on demand below
Originally Aired November 2nd @ 3:05pm
Tags: OMB , GSA , technology , HSPD-12 , Unisys , Jim Flyzik , Tom Trezza , Judy Spencer , Mike Butler , OSD , carol bales , barbara symonds , IRS , venkatapatni puvvada , Gordon Hanah , Bearing Point
Originally Aired January 26th at 3:05pm
Tags: OMB , technology , HSPD-12 , Karen Evans , Jim Flyzik , Scott Hastings , US-VISIT , David Wennergren , Marty Wagner , patrick schambach , Nortel , alan kraft , novell , chris aherne , BMC Software , Tom Trezza