SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Securely and cost-effectively manage
                                                                              your data. See page 3 for details!
                  presents a Training Conference…




Identity
Management
Summit
                                               TM




Enhancing government data collection,
sharing, and protection
                                                                       This critical event includes
                                           Washington, D.C.            top Identity Management
    July 27 – 29, 2009                     Metro Area                  experts, including:
                                                                       Morris Hymes, Jr., SES
Can’t miss in-depth discussions on effective                           Director, Program Management Office,
                                                                       DoD PKI
IdM solutions include:
                                                                       Paul D. Grant, SES
•   Guidelines for the successful implementation on IdM                Special Assistant, Federated Identity
    solutions straight from the White House                            Management and External Partnering,
                                                                       DoD CIO
•   Future requirements and B2B opportunities for identity
                                                                       Robert Carey
    management solutions
                                                                       Chief Information Officer, Department
•   Procurement guidelines on ID & access management                   of the Navy
                                                                       Thomas Dee
•   and many more!                                                     Director, Defense Biometrics, OSD
                                                                       AT&L, DDR&E
                                                                       Rex Lovelady
    Create strategic IdM programs for your organization!   See pg. 4   PM for TWIC, Transportation Security
                                                                       Administration


Media Partners:




                                         www.idga.org/us/identitymanagement
Identity                                           Who You Will Meet:

                                      Management                                         IDGA’s Identity Management Summit
                                                                                         is a forum on the challenges,
                                                                                         requirements and potential solutions for


                                      Summit
                                                                     TM
                                                                                         the successful deployment of IdM
                                                                                         solutions. You will have the unique
                                                                                         opportunity to interact and network with
                                       Enhancing government data collection,             an audience of military, government,
                                       sharing, and protection                           academic, and private sector leaders with
                                                                                         job functions such as:
                                                                                         •   Intelligence Analyst
                                                                                         •   Chief Information Officer
       Dear Colleague,                                                                   •   Chief Technology Officer
                                                                                         •   Program Manager, Identity
       Collecting personally identifiable data                                               Management
                                                is necessary for the security of
       government agencies, as well as for                                               •   Research & Development Director
                                             the security of our nation. Identity        •   Security and Privacy Officers
       management all begins with data
                                           collection, including the collection
       biometric credentials, and the Oba                                        of
                                            ma administration is likely to spe
       $750 million to $1 billion on bio                                            nd
                                            metric applications this year.
                                                              TM
                                                                                         About IDGA
      Identity management systems rang
                                             e from passwords and PINs, to secu                          The Institute for
      tokens and PKI systems. The DoD                                          rity
                                            and government are currently in nee                          Defense & Government
      effective solutions to their identity                                     d of                     Advancement (IDGA) is
                                            management challenges, and are
      on industry experts to help the                                        calling     a non-partisan information based
                                            m.                                           organization dedicated to the promotion
                                                                                         of innovative ideas in public service and
          IDGA’s Identity Management Sum
                                             mit has a two-pronged mission               defense. We bring together speaker
            - discuss the current challenges                                 :
                                              of designing, developing and               panels comprised of military and
                               deploying IdM tools, and                                  government professionals while
       - discover and adopt currently                                                    attracting delegates with decision-
                                        available solutions to these cha
                                                                        llenges          making power from military, government
      This year, IDGA’s Identity Managemen                                               and defense industries. For more
                                           t Summit focuses on data collection,          information, please visit us at
      well as the government’s goal to sha                                        as
                                          re this pertinent information by cos           www.idga.org.
     effective and secure means. This                                          t-
                                          event is your opportunity to claim
     place in the identity management                                         your
                                        community. Meet with key decision
     and top-notch innovators – this is                                      -makers
                                         your chance to join a community
                                                                               of
                                                                                         Here’s what people are
     IdM experts in the defense and
                                         government space!                               saying about IDGA’s events:
     Register yourself and your team tod                                                 “This has been an outstanding
                                        ay by calling 1- 212-885-2683 by
                                                                     or
     the order form on the back of the                                   faxing          conference, primarily due to the quality
                                       brochure to 9212-697-4106You can                  of presenters and invitees.”
     register online at www.idga.org                                     also
                                      /us/identitymanagement.                            – Frank Thompson, Northrop
                                                                                         Grumman
    I look forward to seeing you in July
                                        !
                                                                                         “The lineup of speakers was nothing less
    Very Respectfully,                                                                   than excellent, and I was pleased to hear
                                                                                         fresh and relevant topic coverage… the
                                                                     ecurity
                                                       P . Increase s
                                                        .S                               organization of the agenda and selection
                                                                      ! Learn
                                                       and cut costs
                                                                                         of the speakers was top notch. I had
                                                                       Data              considered a competing conference two
                                                       how to at our
    Kristine Ortiz-Cortes
                                                                       ocus Day.         weeks prior to the IDGA event. We are
    Program Director, IDGA                              Management F                     happy that I chose the IDGA event.”
                                                                        details!
    kristine.cortes@idga.org                            Se e pg. 3 for                   – Tim Meyerhoff, LG Iris Technology
                                                                                         Division




2    Register Today! 212-885-2683
Data Management Focus Day   Data Management Focus Day
                            Monday, July 27, 2009
                            Get up-close and personal with experts in data management and security. Learn in a private,
                            classroom-style setting about the latest advancements and best practices needed in order to
                            collect, share and protect critical government data. Sessions include need-to-know topics such as:
                            • Identification technology advancements
                            • Implementing collection and access technologies that increase security while cutting costs for your organization
                            • Emerging international standards and governance framework for network security



                            8:30 am – 9:00 am              Registration and Coffee

                            9:00 am – 11:00 am                                           Discuss policies and goals in order to move forward with IdM initiatives!

                            Meeting IdM Directives under the New Administration
                            There is a continuing examination by the IC and larger network user interests     •   Assess the progress made under the CNCI’s identity and authentication
                            in government in the role of authentication and identity to ensure secure             components
                            network environments. This on-going debate talks about priorities for
                            government and private sector investments in R&D, deployment of enabling          What you will learn:
                                                                                                              • IdM policy framework and what it means to your organization
                            technologies, policy changes, the role of emerging international standards
                                                                                                              • Priorities for government and private sector investments on IdM
                            and the governance framework for network security.
                                                                                                                technologies
                            All of this is set to be proposed by the new Administration, and will therefore   • Emerging identity requirements, and respective potential technology

                            impact the national security and identity management community. This                solutions
                            session will discuss the change in new administrative policies, with the
                            demands of the HSPD-12, PIV, FIPS 201 taken into consideration.                   Session Leader:
                                                                                                              David Weitzel, Director, Identity Management Practice Area, MITRE
                            How you will benefit:                                                             Corporation
                            • Explore the range of policy issues impinging on current and emerging IdM        Michael Aisenberg, Principal, Federal Systems Security, MITRE Corporation
                              approaches and technologies

                            11:15 am – 1:15 pm                                                                    Cost-effectively acquire software assurance programs!
                            Lunch will be served
                            Best Practices: Acquiring Software Systems for Secure Identity Management
                            The DoD has invested in and developed world class applications and systems            with the entire information infrastructure
                            for identifying and managing personally identifiable information. Systems         •   Gain insight into the growing sophistication of malicious threats
                            software and application software make it possible for government systems
                            and networks to function effectively and efficiently, enabling creation,          What you will learn:
                                                                                                              • Software assurance methodologies necessary for developing or acquiring
                            processing, storage and communication of information assets that enhance
                            homeland security. This dependency on information infrastructure makes              software for government IdM
                                                                                                              • Best practices and materials used in software acquisition training and
                            software assurance an essential element of national security and homeland
                            defense. This session therefore discusses the interdependence of our IdM            education
                            systems with the entire information infrastructure, along with the growing        Session Leader:
                            sophistication of malicious threats that bring about the use of software          Julie Ryan, DSc, Associate Professor for Engineering Management and
                            assurance methodologies for developing or acquiring software.                     Systems Engineering and Lead Professor for Information Security
                            How you will benefit:                                                             Management
                            • Get a better understanding of the interdependence of our IdM systems




                            1:30 – 3:30 pm                                           Secure government systems and employee identities from malicious attacks!
                            Security Beyond CAC Cards: Securing the Desktops of 15M+ Employees
                            Government employees are provided with access cards that could potentially        •   Gain insight into data recovery using data regeneration
                            get infected with malicious code, even from trusted internet sites. What
                            happens when a CAC card is infected, and all of the user’s personal               What you will learn:
                                                                                                              • Individual computing and identity management
                            information is compromised? This session will discuss the prevalent threats on
                                                                                                              • Enterprise computing
                            access cards, and what can be done to avoid malicious attacks on not only
                                                                                                              • Autonomic recovery of government computer systems
                            the system, but on the user’s identity as well.
                            How you will benefit:                                                             Session Leader:
                            • Obtain a better understanding of potential threats to your computer             Anup Ghosh, Professor, George Mason University and Chief Scientist,
                              systems                                                                         Center for Secure Information Systems, Volgenau School of Information
                            • Learn how an attack is detected in enterprise-wide servers and client           Technology and Engineering
                              workstations


                                                           Obtain a better understanding of biometric system performance for large-scale applications!
                            3:45 – 5:45 pm
                            Performance Evaluation on Biometric Systems
                            Biometric devices offer substantial advantages over the traditional user          •   Find out more about information assurance when using biometric devices
                            authentication approaches. However, very limited knowledge is available to            in large-scale computer networks
                            assess the performance of biometric systems in isolation and/or as a part of
                            larger applications. This session will therefore discuss the study that was       What you will learn:
                                                                                                              • Design guidelines for multimodal biometric systems
                            conducted regarding information assurance aspects of the use of biometric
                                                                                                              • Individual biometrics working in a multimodal authentication framework
                            devices in large-scale computer networks. It will include the identification of
                                                                                                              • Performance of biometric systems in isolation and/or as a part of larger
                            statistical parameters for the improved performance of multi-modal biometric
                            identification systems.                                                             applications

                            How you will benefit:                                                             Session Leader:
                            • Discover system-wide reliability impacts of biometric authentication devices    Dr. Bojan Cukic, Robert C. Byrd Professor, Computer Science and Electrical
                                                                                                              Engineering, West Virginia University

                                                              Register Today! 212-885-2683 Mike Glover                                                                                     3
Main Summit Days
                               Tuesday, July 28, 2009                                                                                                            Wednesday, July 29, 2009
                               7:30    Registration and Coffee                                                                                                   7:30    Registration and coffee
                               8:15    Chairperson’s Welcome & Opening Remarks                                                                                   8:15    Chairperson’s Welcome
                               8:25    Putting Policy into Practice                                                                                              8:25    DoD Identity Management – Where are we, and where
                                         Investment guidelines to advance identity management technologies                                                               are we headed?
Opening
Keynote




                                       •


                                         Policies and strategies for interagency data management collaboration                                                             Current state of affairs of the new Administration regarding funding for




                                                                                                                        Opening
                                                                                                                        Keynote
                                       •                                                                                                                                 •

                                       • Goals for successful international and public sector partnerships                                                                 IdM technologies
                                       Duane Blackburn, Office of Science and Technology Policy, Executive                                                               • Future opportunities for the IdM community, within and across the
                                       Office for the President                                                                                                            federal government
                                                                                                                                                                         Willam Gravell, Diogenes Group and former Special Advisor to the
                               9:05    The Intelligence Community Identity and Access                                                                                    Secretary of the Navy for Identity Management
                                       Management (IdAM) Program
   Keynote




                                       • Search for a single, consistent and persistent digital identifier coupled as                                            9:05    Assured Information Sharing for the Extended
 Keynote




                                         means to information sharing within the intelligence community                                                                  Enterprise
                                       • Provision of a centralized management entity for strategic planning,                                                            • Key Conceptual Threats
                                         coordination and oversight for the implementation of IC IdAM Enterprise                                                         • Identity and Access Management with External Partners - DoD Perspective
                                         Services                                                                                                                        • Federal Identity, Credential and Access (ICAM) Subcommittee and
                                       Greg Hall, Identity Management Program Manager, ODNI/CIO                                                                            initiatives




                                                                                                                          CIO Offices
                                                                                                                                                                         Paul Grant, SES, Special Assistant for Identity Management and
                               9:45    Networking Break                                                                                                                  External Partnering, DoD CIO

                               10:30   Information and Identity Assurance                                                                                        9:45    Networking Break
 Information Assurance Focus




                                       • Requirements for coordinated convergence
                                       • Guidelines on how to meet PKI compliance standards                                                                      10:30   DON Security, Access, and Collaboration
                                       • Future DoD initiatives for PKI and identity management                                                                          • Technical infrastructure and standards requirements for interoperability
                                       Morris Hymes, Jr., SES, Director, Program Management Office, DoD PKI                                                              • Allocation of resources for data access and security
                                                                                                                                                                         • Budget and acquisition agility for information technology platforms
                               11:10   Information Assurance in a Collaborative Environment                                                                              Robert Carey, Chief Information Officer, Department of the Navy
                                       •  Methods of information collection
                                       •  Accessing the information using a secure, airtight network                                                             11:10   Identity Assurance and Access Control
                                        • Maintaining information integrity across the enterprise                                                                        • Acquiring improved collection devices with large-scale operational
                                       Will Janssen, Chief Systems and Network Analysis Center,                                                                            capabilities
                                       Information Assurance Directorate, National Security Agency                                                                       • The push for interagency collaboration, and respective DoD
                                                                                                                                                                           requirements
                                                                                                                          Access Control Focus




                               11:50   LUNCH                                                                                                                             Thomas P. Dee, Director of Defense Biometrics, Office of the
                                                                                                                                                                         Secretary of Defense AT&L, DDR&E
                               1:00    TSA TWIC Program: Hidden Issues Regarding Deployment                                                                              CAPT James Murray, USN, Deputy Director, Defense Biometrics,
                                       Revealed                                                                                                                          Office of the Secretary of Defense, AT&L, DDR&E
                                       • National compliance requirements for TWIC
                                       • Deployment challenges                                                                                                   11:50   LUNCH
                                       • Lessons learned in the development and design of tools
                                       Rex Lovelady, TWIC Program Manager, Transportation Security                                                               1:00    NASA Level of Assurance and Identity Trust
                                       Administration, DHS                                                                                                                 Underlying architecture for NASA data management
 Data Collection and Access




                                                                                                                                                                         •

                                                                                                                                                                         • Physical and logical access control requirements
                               1:40    USCG Maritime Intelligence Detachment                                                                                             • Needed technologies that are not currently available
                                       • Identity and vessel intelligence: a national policy                                                                             Corinne S. Irwin, PMP, OCIO, Architecture and Infrastructure
                                       • Case analysis – impacting operations across the spectrum                                                                        Division, NASA
                                       • MDA realization of HSPD-24 objectives
                                       Dalton Jones, Technical Director, US Coast Guard Intelligence                                                             1:40    Round Table Discussion: Government and Vendor
                                       Coordination Center                                                                                                               Partnerships
                                                                                                                          Interactive




                                                                                                                                                                         Take part in facilitated roundtable discussions about successful
                               2:20    Networking Break                                                                                                                  collaboration between government agencies and industry leaders, and how
                                                                                                                                                                         your organization can benefit from future partnerships. If you are an IdM
                               2:50    Procurement Strategies for ID and Access Management                                                                               expert and are interested in being a table monitor, contact
                                       • Assurance levels and risk assessments                                                                                           kristine.cortes@idga.org.
                                       • Credential service provider confidence
                                       • Best practices for e-authentication and interoperability testing                                                        2:20    Networking Break
                                       Stephen P. Sill, Acting Program Manager, E-Authentication Office,
                                       Federal Acquisition Service-QTEAA, General Services Administration                                                        2:50    Identity Management as a Force Multiplier
                                                                                                                          Closing sessions – the Future of IdM




                                                                                                                                                                         •  Preparing the 21st century government workforce for future identity
                               3:30    Discovering Identity Management Needs for Future                                                                                     management strategies
                                       Initiatives                                                                                                                       •  Enhanced certification programs for biometrics and IdM professionals
      IdM Policy




                                       • New convergence activities within the federal government on IdM                                                                 •  Current and future capabilities for the data management workforce
                                         requiring new policies                                                                                                          Dr. Michael T. Yura, DoD Biometric Fusion Center, Biometrics Task
                                       • Expansion of IdM into all government business activities                                                                        Force
                                       Albert Miller, President, 5M Inc, - in support of the Deputy Under
                                       Secretary of Defense for Policy Integration                                                                               3:30    Protection of DoD Invested IT Infrastructures
                                                                                                                                                                         • Priorities for government and private sector investments in R&D initiatives
                               4:15    End of Day One                                                                                                                    • Protection of critical infrastructure in government
                                                                                                                                                                         • Application of public policy processes to national and international
                                                                                                                                                                           institutions
                                  Learn and network with your peers to                                                                                                   Michael Aisenberg, Principal, Federal Systems Security, MITRE
                                                                                                                                                                         Corporation
                                     benefit your B2B partnerships!
                                                                                                                                                                 4:10    End of Main Conference


                                                                                          Register Today! 212-885-2683 Mike Glover                                                                                                                       4
DELEGATE REGISTRATION FORM
                          DISCOUNT CODE: NAD/MG




PLEASE RETURN TO: Michael Glover (NAD/MG)
                                                      DIRECT: 212-885-2683
EMAIL: michael.glover@idga.org                        FAX:    212-697-4106
Pricing                   Industry        Military, Government & Academia

                                                                  Standard
Focus Day                 $500.00                                 $500.00
(Mon July 27)
Main Summit               $999.00                                 $999.00
(Tue-Wed July 28-29)
Company/Unit Information:
Company/Unit Name:
Mailing Address:
Main Telephone #:
Direct Telephone #:
Fax #:
Email Address:

Delegate Information:
  Delegate Names            Delegate Titles         Focus Day           Cost
                                                      (Y/N)
1.
2.
3.
4.
5.
          TOTAL AMOUNT DUE (including any or all                    $
applicable taxes):

Payment Information:
VISA [ ]            AMEX [ ]          MasterCard [ ]              DINERS [ ]
Card Number:                                  Expiry Date:
Name of Cardholder:

PLEASE FAX COMPLETED REGISTRATION FORM TO 212-697-4106

Weitere ähnliche Inhalte

Kürzlich hochgeladen

Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 

Kürzlich hochgeladen (20)

Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Empfohlen (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Identity Management 2009

  • 1. Securely and cost-effectively manage your data. See page 3 for details! presents a Training Conference… Identity Management Summit TM Enhancing government data collection, sharing, and protection This critical event includes Washington, D.C. top Identity Management July 27 – 29, 2009 Metro Area experts, including: Morris Hymes, Jr., SES Can’t miss in-depth discussions on effective Director, Program Management Office, DoD PKI IdM solutions include: Paul D. Grant, SES • Guidelines for the successful implementation on IdM Special Assistant, Federated Identity solutions straight from the White House Management and External Partnering, DoD CIO • Future requirements and B2B opportunities for identity Robert Carey management solutions Chief Information Officer, Department • Procurement guidelines on ID & access management of the Navy Thomas Dee • and many more! Director, Defense Biometrics, OSD AT&L, DDR&E Rex Lovelady Create strategic IdM programs for your organization! See pg. 4 PM for TWIC, Transportation Security Administration Media Partners: www.idga.org/us/identitymanagement
  • 2. Identity Who You Will Meet: Management IDGA’s Identity Management Summit is a forum on the challenges, requirements and potential solutions for Summit TM the successful deployment of IdM solutions. You will have the unique opportunity to interact and network with Enhancing government data collection, an audience of military, government, sharing, and protection academic, and private sector leaders with job functions such as: • Intelligence Analyst • Chief Information Officer Dear Colleague, • Chief Technology Officer • Program Manager, Identity Collecting personally identifiable data Management is necessary for the security of government agencies, as well as for • Research & Development Director the security of our nation. Identity • Security and Privacy Officers management all begins with data collection, including the collection biometric credentials, and the Oba of ma administration is likely to spe $750 million to $1 billion on bio nd metric applications this year. TM About IDGA Identity management systems rang e from passwords and PINs, to secu The Institute for tokens and PKI systems. The DoD rity and government are currently in nee Defense & Government effective solutions to their identity d of Advancement (IDGA) is management challenges, and are on industry experts to help the calling a non-partisan information based m. organization dedicated to the promotion of innovative ideas in public service and IDGA’s Identity Management Sum mit has a two-pronged mission defense. We bring together speaker - discuss the current challenges : of designing, developing and panels comprised of military and deploying IdM tools, and government professionals while - discover and adopt currently attracting delegates with decision- available solutions to these cha llenges making power from military, government This year, IDGA’s Identity Managemen and defense industries. For more t Summit focuses on data collection, information, please visit us at well as the government’s goal to sha as re this pertinent information by cos www.idga.org. effective and secure means. This t- event is your opportunity to claim place in the identity management your community. Meet with key decision and top-notch innovators – this is -makers your chance to join a community of Here’s what people are IdM experts in the defense and government space! saying about IDGA’s events: Register yourself and your team tod “This has been an outstanding ay by calling 1- 212-885-2683 by or the order form on the back of the faxing conference, primarily due to the quality brochure to 9212-697-4106You can of presenters and invitees.” register online at www.idga.org also /us/identitymanagement. – Frank Thompson, Northrop Grumman I look forward to seeing you in July ! “The lineup of speakers was nothing less Very Respectfully, than excellent, and I was pleased to hear fresh and relevant topic coverage… the ecurity P . Increase s .S organization of the agenda and selection ! Learn and cut costs of the speakers was top notch. I had Data considered a competing conference two how to at our Kristine Ortiz-Cortes ocus Day. weeks prior to the IDGA event. We are Program Director, IDGA Management F happy that I chose the IDGA event.” details! kristine.cortes@idga.org Se e pg. 3 for – Tim Meyerhoff, LG Iris Technology Division 2 Register Today! 212-885-2683
  • 3. Data Management Focus Day Data Management Focus Day Monday, July 27, 2009 Get up-close and personal with experts in data management and security. Learn in a private, classroom-style setting about the latest advancements and best practices needed in order to collect, share and protect critical government data. Sessions include need-to-know topics such as: • Identification technology advancements • Implementing collection and access technologies that increase security while cutting costs for your organization • Emerging international standards and governance framework for network security 8:30 am – 9:00 am Registration and Coffee 9:00 am – 11:00 am Discuss policies and goals in order to move forward with IdM initiatives! Meeting IdM Directives under the New Administration There is a continuing examination by the IC and larger network user interests • Assess the progress made under the CNCI’s identity and authentication in government in the role of authentication and identity to ensure secure components network environments. This on-going debate talks about priorities for government and private sector investments in R&D, deployment of enabling What you will learn: • IdM policy framework and what it means to your organization technologies, policy changes, the role of emerging international standards • Priorities for government and private sector investments on IdM and the governance framework for network security. technologies All of this is set to be proposed by the new Administration, and will therefore • Emerging identity requirements, and respective potential technology impact the national security and identity management community. This solutions session will discuss the change in new administrative policies, with the demands of the HSPD-12, PIV, FIPS 201 taken into consideration. Session Leader: David Weitzel, Director, Identity Management Practice Area, MITRE How you will benefit: Corporation • Explore the range of policy issues impinging on current and emerging IdM Michael Aisenberg, Principal, Federal Systems Security, MITRE Corporation approaches and technologies 11:15 am – 1:15 pm Cost-effectively acquire software assurance programs! Lunch will be served Best Practices: Acquiring Software Systems for Secure Identity Management The DoD has invested in and developed world class applications and systems with the entire information infrastructure for identifying and managing personally identifiable information. Systems • Gain insight into the growing sophistication of malicious threats software and application software make it possible for government systems and networks to function effectively and efficiently, enabling creation, What you will learn: • Software assurance methodologies necessary for developing or acquiring processing, storage and communication of information assets that enhance homeland security. This dependency on information infrastructure makes software for government IdM • Best practices and materials used in software acquisition training and software assurance an essential element of national security and homeland defense. This session therefore discusses the interdependence of our IdM education systems with the entire information infrastructure, along with the growing Session Leader: sophistication of malicious threats that bring about the use of software Julie Ryan, DSc, Associate Professor for Engineering Management and assurance methodologies for developing or acquiring software. Systems Engineering and Lead Professor for Information Security How you will benefit: Management • Get a better understanding of the interdependence of our IdM systems 1:30 – 3:30 pm Secure government systems and employee identities from malicious attacks! Security Beyond CAC Cards: Securing the Desktops of 15M+ Employees Government employees are provided with access cards that could potentially • Gain insight into data recovery using data regeneration get infected with malicious code, even from trusted internet sites. What happens when a CAC card is infected, and all of the user’s personal What you will learn: • Individual computing and identity management information is compromised? This session will discuss the prevalent threats on • Enterprise computing access cards, and what can be done to avoid malicious attacks on not only • Autonomic recovery of government computer systems the system, but on the user’s identity as well. How you will benefit: Session Leader: • Obtain a better understanding of potential threats to your computer Anup Ghosh, Professor, George Mason University and Chief Scientist, systems Center for Secure Information Systems, Volgenau School of Information • Learn how an attack is detected in enterprise-wide servers and client Technology and Engineering workstations Obtain a better understanding of biometric system performance for large-scale applications! 3:45 – 5:45 pm Performance Evaluation on Biometric Systems Biometric devices offer substantial advantages over the traditional user • Find out more about information assurance when using biometric devices authentication approaches. However, very limited knowledge is available to in large-scale computer networks assess the performance of biometric systems in isolation and/or as a part of larger applications. This session will therefore discuss the study that was What you will learn: • Design guidelines for multimodal biometric systems conducted regarding information assurance aspects of the use of biometric • Individual biometrics working in a multimodal authentication framework devices in large-scale computer networks. It will include the identification of • Performance of biometric systems in isolation and/or as a part of larger statistical parameters for the improved performance of multi-modal biometric identification systems. applications How you will benefit: Session Leader: • Discover system-wide reliability impacts of biometric authentication devices Dr. Bojan Cukic, Robert C. Byrd Professor, Computer Science and Electrical Engineering, West Virginia University Register Today! 212-885-2683 Mike Glover 3
  • 4. Main Summit Days Tuesday, July 28, 2009 Wednesday, July 29, 2009 7:30 Registration and Coffee 7:30 Registration and coffee 8:15 Chairperson’s Welcome & Opening Remarks 8:15 Chairperson’s Welcome 8:25 Putting Policy into Practice 8:25 DoD Identity Management – Where are we, and where Investment guidelines to advance identity management technologies are we headed? Opening Keynote • Policies and strategies for interagency data management collaboration Current state of affairs of the new Administration regarding funding for Opening Keynote • • • Goals for successful international and public sector partnerships IdM technologies Duane Blackburn, Office of Science and Technology Policy, Executive • Future opportunities for the IdM community, within and across the Office for the President federal government Willam Gravell, Diogenes Group and former Special Advisor to the 9:05 The Intelligence Community Identity and Access Secretary of the Navy for Identity Management Management (IdAM) Program Keynote • Search for a single, consistent and persistent digital identifier coupled as 9:05 Assured Information Sharing for the Extended Keynote means to information sharing within the intelligence community Enterprise • Provision of a centralized management entity for strategic planning, • Key Conceptual Threats coordination and oversight for the implementation of IC IdAM Enterprise • Identity and Access Management with External Partners - DoD Perspective Services • Federal Identity, Credential and Access (ICAM) Subcommittee and Greg Hall, Identity Management Program Manager, ODNI/CIO initiatives CIO Offices Paul Grant, SES, Special Assistant for Identity Management and 9:45 Networking Break External Partnering, DoD CIO 10:30 Information and Identity Assurance 9:45 Networking Break Information Assurance Focus • Requirements for coordinated convergence • Guidelines on how to meet PKI compliance standards 10:30 DON Security, Access, and Collaboration • Future DoD initiatives for PKI and identity management • Technical infrastructure and standards requirements for interoperability Morris Hymes, Jr., SES, Director, Program Management Office, DoD PKI • Allocation of resources for data access and security • Budget and acquisition agility for information technology platforms 11:10 Information Assurance in a Collaborative Environment Robert Carey, Chief Information Officer, Department of the Navy • Methods of information collection • Accessing the information using a secure, airtight network 11:10 Identity Assurance and Access Control • Maintaining information integrity across the enterprise • Acquiring improved collection devices with large-scale operational Will Janssen, Chief Systems and Network Analysis Center, capabilities Information Assurance Directorate, National Security Agency • The push for interagency collaboration, and respective DoD requirements Access Control Focus 11:50 LUNCH Thomas P. Dee, Director of Defense Biometrics, Office of the Secretary of Defense AT&L, DDR&E 1:00 TSA TWIC Program: Hidden Issues Regarding Deployment CAPT James Murray, USN, Deputy Director, Defense Biometrics, Revealed Office of the Secretary of Defense, AT&L, DDR&E • National compliance requirements for TWIC • Deployment challenges 11:50 LUNCH • Lessons learned in the development and design of tools Rex Lovelady, TWIC Program Manager, Transportation Security 1:00 NASA Level of Assurance and Identity Trust Administration, DHS Underlying architecture for NASA data management Data Collection and Access • • Physical and logical access control requirements 1:40 USCG Maritime Intelligence Detachment • Needed technologies that are not currently available • Identity and vessel intelligence: a national policy Corinne S. Irwin, PMP, OCIO, Architecture and Infrastructure • Case analysis – impacting operations across the spectrum Division, NASA • MDA realization of HSPD-24 objectives Dalton Jones, Technical Director, US Coast Guard Intelligence 1:40 Round Table Discussion: Government and Vendor Coordination Center Partnerships Interactive Take part in facilitated roundtable discussions about successful 2:20 Networking Break collaboration between government agencies and industry leaders, and how your organization can benefit from future partnerships. If you are an IdM 2:50 Procurement Strategies for ID and Access Management expert and are interested in being a table monitor, contact • Assurance levels and risk assessments kristine.cortes@idga.org. • Credential service provider confidence • Best practices for e-authentication and interoperability testing 2:20 Networking Break Stephen P. Sill, Acting Program Manager, E-Authentication Office, Federal Acquisition Service-QTEAA, General Services Administration 2:50 Identity Management as a Force Multiplier Closing sessions – the Future of IdM • Preparing the 21st century government workforce for future identity 3:30 Discovering Identity Management Needs for Future management strategies Initiatives • Enhanced certification programs for biometrics and IdM professionals IdM Policy • New convergence activities within the federal government on IdM • Current and future capabilities for the data management workforce requiring new policies Dr. Michael T. Yura, DoD Biometric Fusion Center, Biometrics Task • Expansion of IdM into all government business activities Force Albert Miller, President, 5M Inc, - in support of the Deputy Under Secretary of Defense for Policy Integration 3:30 Protection of DoD Invested IT Infrastructures • Priorities for government and private sector investments in R&D initiatives 4:15 End of Day One • Protection of critical infrastructure in government • Application of public policy processes to national and international institutions Learn and network with your peers to Michael Aisenberg, Principal, Federal Systems Security, MITRE Corporation benefit your B2B partnerships! 4:10 End of Main Conference Register Today! 212-885-2683 Mike Glover 4
  • 5. DELEGATE REGISTRATION FORM DISCOUNT CODE: NAD/MG PLEASE RETURN TO: Michael Glover (NAD/MG) DIRECT: 212-885-2683 EMAIL: michael.glover@idga.org FAX: 212-697-4106 Pricing Industry Military, Government & Academia Standard Focus Day $500.00 $500.00 (Mon July 27) Main Summit $999.00 $999.00 (Tue-Wed July 28-29) Company/Unit Information: Company/Unit Name: Mailing Address: Main Telephone #: Direct Telephone #: Fax #: Email Address: Delegate Information: Delegate Names Delegate Titles Focus Day Cost (Y/N) 1. 2. 3. 4. 5. TOTAL AMOUNT DUE (including any or all $ applicable taxes): Payment Information: VISA [ ] AMEX [ ] MasterCard [ ] DINERS [ ] Card Number: Expiry Date: Name of Cardholder: PLEASE FAX COMPLETED REGISTRATION FORM TO 212-697-4106