Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- Continuous Monitoring: Tools and Techniques for Trustworthy Government IT
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- Mission-critical Apps in the Cloud
- Mobile Device Management
- The Modern Federal Threat Landscape
- The Path from Legacy Systems
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: privacy
Long-time privacy and cybersecurity expert to join the government to work on similar issues. EPA's Lisa Schlosser also takes on a new role at her agency.
The document describes how the agency protects privacy, including training and dealing with personal information. DHS tracks all privacy breaches in a secure online database.
WFED's Max Cacas reports.
A New York Times op-ed asks that question.
The rapid convergence of security technologies combined with growing concerns about individual privacy are creating a need to understand the purpose of identification and credentialing in your environment and the impact on the public. Financial institutions and commercial services are adopting high tech methods to protect consumer access to convenient online transaction systems. Governments have adopted electronic identity documents to facilitate fast and convenient border crossing including ePassports, enhanced driver's licenses, and RFID Passport cards. We are all aware of public space surveillance systems to reduce street crime in urban centers. Proposed identity credentials are to provide a trusted citizen identification solution for employment authorization including biometric verification. How will these identification systems foster trust and confidence by consumers that their personal information is secure and protected? Join us for a discussion with experts in the field of identification and credentialing to learn about how these innovations can meet security and consumer needs while managing the impact on privacy and civil liberties.
President appoints Mike Resnick to be the new senior director for information sharing policy. Congress questions how the White House position will mesh with the Program Manager for the Information Sharing Environment.
Aired Wednesday, July 15th at 2:05pm
With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.
Tags: technology , identity management , Access Control , Booz Allen , identity theft , Identity Data , smart card , Virtual Identity , Booz Allen Hamilton , intelligence , Federated , Federated Identity , SOA , Credential , Credentialing , Authorization , PKI , PACS , LACS , RBAC , information synchronization , HSPD-12 , authentication , identity , integration , synchronization , virtual , theft , authorize , authenticate , verification , verify , access , certificate , security certificate , single sign on , directory , provision , provisioning , virtual world , smartcard , IDM , IdAM , Logical Access , Physical Access , public key encryption , PIV , FIPS 201 , FIPS , ABAC , attribute , attribute retrieval service , audit , auditing , logging , reporting , CAC , Common Access Card , compliance , delegated administration , entitlements management , entitlement , Federation , framework , metadirectory , password , proofing , risk based access control , rule based access control , RuBAC , self-service , virtual directory , workflow automation