Secure Access: Next Steps In Identity Management

Secure Access: Next Steps In Identity Management

 

Available On Demand
Duration 60min
Speakers
John Foley
Editor, InformationWeek Government
John Foley
John spearheads InformationWeek's coverage of government technology. He manages InformationWeek Government, including its exclusive research reports on Federal IT Priorities, cybersecurity, and cloud computing. He writes, Tweets, and speaks frequently about the IT strategies of the White House, Department of Defense, U.S. Intelligence Community, and other government agencies. John previously managed InformationWeek magazine and, before that, covered Microsoft, databases, open systems, business intelligence, and a wide range of enterprise technologies and IT issues for InformationWeek.
 
Michael A. Davis
CEO of Savid Technologies, and InformationWeek Contributing Editor
Michael A. Davis
Michael A. Davis has earned a reputation as one of the nation's leading authorities on information technology. The list of organizations that rely on his council includes AT&T, Sears, Exelon, the US Department of Defense, and Discover Financial. Mr. Davis is President of External IT, a national managed IT services, cloud services, and IT security provider that focuses on unifying the business IT experience. In 2005, Mr. Davis founded Savid Technologies, an IT security consulting firm. He led Savid to be the 23rd fastest growing company in Chicago as measured by Inc. magazine, and by 2010, Savid was ranked 611 on the Inc. 5000 list of fastest growing companies in America.
Dave Murphy
Business Development Manager
Zebra Technologies
Dave Murphy
Dave has been with Zebra for over 15 years, focused on card business/government. He has extensive knowledge around secure access control solutions and federal credentialing. Dave has worked on smart card technologies in government environments and PIV Cards and compliances.

Identity management and credential technologies in government environments aim to provide fast and secure access to information, systems, and physical locations. But the seeming simplicity of single sign-on and smart cards requires well-conceived architectures and effective technology implementations on backend systems. Government IT teams have begun to implement ID management, but they still have a long way to go.

In this editorial webcast for government IT pros, InformationWeek Government will provide an update on the Federal Identity, Credential, and Access Management initiative, the National Strategy for Trusted Identities in Cyberspace, and other programs, and on agency efforts to meet those objectives. Our expert speakers will discuss the challenges and opportunities of ID management and strategies for successful projects.

In this webcast, we will:

  • Review key ID management initiatives and requirements
  • Discuss ways to extend ID management to the cloud and other new technologies
  • Assess the role of ID management in an agency's enterprise security strategy
  • Evaluate how PIV cards and electronic credentials can be used for mobile access
  • Analyze building security and access control within facilities
  • Answer your questions on policy and implementation
Already a member? Login