Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Value of Health IT
Shows & Panels
Search Tags: identity theft
General Service Administration employees are on alert for identity theft after an employee accidentally sent the names and social security numbers of the agency's entire staff to a private email address.
The Virginia government is taking new measures to combat its rank as 15th in the country for most identity theft complaints.
Bryan Ichikawa, vice president of identity solutions at Unisys, joined the DorobekINSIDER to discuss the most secure way to protect your identity, including fingerprint biometrics.
BRUNSWICK -- Elsie Wigington doesn't like to throw letters that have her Social Security or driver's license numbers and other personal information on them into the trash
Tags: Brunswick ,
Montgomery County detectives are searching for a Virginia woman who committed numerous crimes including auto theft, identity theft, and bank fraud in the D.C. region.
On a per capita basis, the District has the most cyber crooks. Maryland ranks 19th and Virginia 28th.
Wednesday, November 11th, 2009 at 2:05pm
Identity Theft is a multifaceted problem that has grown to epidemic proportions with the development of the internet and of the on-line economy.
Tags: technology , Booz Allen Hamilton , Booz Allen Distinguished Speaker Series , Kathleen Walter , IRS , Richard Power , CyLab , Carnegie Mellon University , Calivin Sneed , Blue Cross Blue Shield Association , Kennethe Jenkins , US Secret Service , cyber crime ,
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , identity management , Access Control , Booz Allen , privacy , Identity Data , smart card , Virtual Identity , Booz Allen Hamilton , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PKI , PACS , LACS , RBAC , information synchronization , HSPD-12 , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , auditing , logging , reporting , CAC , Common Access Card , compliance , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation