Identity Management Symposium
|
|
- Suzan Gordon
- 6 years ago
- Views:
Transcription
1 Defense Strategies Institute Professional Educational Forum: Identity Management Symposium Advancing Biometric and Identity Activity Solutions April 18-19, 2017: Mary M. Gates Learning Center Alexandria, VA
2 Program Design & Goal: To more accurately identify threats that pose risks to vital U.S. Interests, the U.S. Government is actively seeking improvements to their biometric, identity and access management capabilities in order to provide greater insight on the behavior, intent and actions of known and unknown threat actors. As the need to secure valuable information online grows exponentially, the U.S. Government and DoD will continue to implement greater identity management strategies and adopt biometric technologies that promote greater online security. The 2017 Identity Management Symposium will provide valuable information on the current and prospective initiatives that the U.S. Government supports in order to integrate advanced identity and access management practices for greater defense and security. The Symposium will also provide updates on the biometric initiatives and technologies that improve the efficiency and security of Government Organizations. DSI s team specializes in the extensive research and development of our Symposium's content and focus areas, and we will assemble the most respected minds in the community from operational leaders, the R&D Community, key policy-makers, as well as solution providers from Industry and Academia. Our non-partisan approach allows us to reach across all involved organizations bring together a truly holistic group of decision makers and solution providers. Operating Guidelines: DSI s Symposium directly supports DoD, DHS, and Government priorities by providing a conduit for officials to efficiently reach audiences outside of their respective offices that directly impact their department's mission success, at no charge to the government, and in an efficient expenditure of time. DSI s Symposium will provide a forum to address and improve internal and external initiatives, meet with and hear from partner organizations, disseminate vital capability requirements to industry, increase visibility within the larger community, and generally support their mission. * The Symposium is open and complimentary to all DoD and Federal employees and is considered an educational and training forum. * (Industry and academia members are charged a fee of attendance) Symposium is CLOSED TO PRESS / NO RECORDINGS General Target Audience: Identity Management, Biometrics, Access Management, Identity Activity, Cyber Security, Forensics, Identity Intelligence, Digital Forensics Specific topics to be discussed include: - Next-Generation Access Management and Credentialing Initiatives - Current and future Mobile Biometric Capabilities and Standards - Multi-Modal Authentication Initiatives and Updates - Identity Intelligence Information Exchange and Sharing Initiatives - Standardizing Online Identity Practices to Increase Verification and Security - Biometric Technology R&D Requirements and Focus Areas - Big Data Solutions to Bolster Identification Information Collection - Advancements to Biometric Search Capabilities - Cyber Security Considerations and Initiatives - Recognition Technology Strategies post US-VISIT/IDENT - Biometric Investment Priorities; Future Trends and Industry s Role - Digital Forensics Initiatives - Improvements to Biometric Matching and Reporting - Facilitating Best Biometric Practices for Greater Border Protection - RDT&E for Future Biometric Modalities
3 Topics & Speaker Times Subject to Edits April 18, :00-8:45 Registration and Light Breakfast Reception Open 8:45-9:00 Moderator Opening Remarks Benji Hutchinson (Confirmed) Senior Director, Washington, D.C. Operations NEC Corporation of America 9:00-9:50 Providing Timely Criminal Justice Information to Reduce Terrorist and Criminal Activity - Strategies to enhance information sharing capabilities with relevant mission partners - Cyber security considerations for information sharing - R&D efforts supporting greater interoperability for advanced information sharing James Loudermilk (Confirmed) Senior Level Technologist, CJIS FBI Marie E. Bernoi (Confirmed) Unit Chief, Identity Intelligence Unit Terrorist Screening Center, FBI 9:50-10:30 Enabling Identity Dominance on the Battlefield and Across the DoD - Updates on the BAT-A & DoD ABIS Programs and their future considerations - Strategies and initiatives to enhance data sharing capabilities with mission partners - Future acquisition priorities that support interoperable capabilities - Opportunities for industry COL Donald Hurst, USA (Confirmed) PM, DoD Biometrics PEO IEW&S 10:30-11:00 Networking Break 11:00-11:40 Advancing Identity Operations at the DoD for Enhanced National Security - Developing I2 capabilities to enhance intelligence analysis activities for JFCs and CCDRs support - Initiatives supporting greater forensic and biometric capabilities for DoD operations and activities - Identifying opportunities to enhance physical access control for DoD functions COL Dan McElroy, USA (Confirmed) Acting Director Defense Forensics and Biometrics Agency 11:40-12:20 Future Biometric & Identity Management Considerations at OBIM - Developing futures identity strategies - Considerations on future identity systems technology - Opportunities for industry John Boyd (Confirmed) Assistant Director, Futures Identity, OBIM DHS 12:20-1:00 Networking Lunch
4 1:00-1:40 Strengthening Identity Management Practices for Greater Access Management at the DoD - Updates on Cybersecurity Discipline Implementation Plan and its effect on current authentication capabilities - Developing a single identity standard to increase interoperability capabilities with mission partners and allies - Opportunities for industry: solutions for mobile capabilities and disconnected end users - Defining privileged access management frameworks Col Tom Clancy (Confirmed) Director, Identity Management Programs DoD 1:40-2:10 Identity and Account Protection - Establishing Identity as an important foundation to Cybersecurity - Enabling Multi Factor Authentication for higher security on legacy applications - Identity & Attribute Federation for finer grained authentication/authorization Joel Rader (Confirmed) Senior Solutions Architect Radiant Logic, Inc. 2:10-2:50 Department of Homeland Security, Biometric Policy and Strategy Considerations for the Future - Leveraging advanced credentialing methods for enhanced security capabilities - Current status of the DHS Biometric Framework DHS policy considerations for creating a DHS integrated biometrics enterprise Steve Yonkers (Confirmed) Director of Identity and Credentialing Screening Coordination Office, Office of Policy, DHS 2:50-3:10 Networking Break 3:10-3:50 Developing Digital Identity Security Capabilities for Individuals and Organizations at NIST - Updates on NSTIC program; the way ahead - Initiatives supporting advanced authentication measures for enhanced user privacy - Strategies to establish frameworks that enable objective measurement of identity solutions - Efforts to standardize identity practices Paul Grassi, CISSP (Confirmed) Senior Standards and Technology Advisor, NSTIC U.S. Department of Commerce, NIST 3:50-4:30 Leveraging Biometrics and Identity Management Strategies to Enforce Privacy Protections and Transparency for DHS Activities - Privacy compliance and information governance initiatives for DHS s biometric enterprise - Opportunities to leverage identity management capabilities for enhanced access control - Mission partner strategies for sharing and disseminating information Laurence Castelli (Confirmed) Senior Advisor to the Chief Privacy Officer Privacy Office, DHS
5 4:30-5:10 Identity Science and Technology Initiatives at CERDEC - Initiatives that promote enhanced search capabilities - Automated object recognition capability developments - Updates on requirements needed and where industry can assist Buane Delaine (Confirmed) Chief, Identity Intelligence Branch (I2WD) CERDEC April 19, :15-8:45 Registration and Light Breakfast Reception Open 8:45-9:00 Moderator Opening Remarks Benji Hutchinson (Confirmed) Senior Director, Washington, D.C. Operations NEC Corporation of America 9:00-9:40 Transforming Air Force Cybersecurity through Innovative Policy and Technologies - Leveraging advanced information security technologies to enhance the protection of critical Warfighter/Business information - Defending Air Force Networks through implementation of advanced defense tools - Risk management strategies that protect Airmen and USAF Core Missions Frank Konieczny, SES (Confirmed) Chief Technology Officer USAF 9:40-10:20 Enhancing Physical and Logical Access Control Measures to Advance DoD Security - Initiatives supporting greater physical access control - Strategies to enhance logical access control validation - Update on identification and authentication programs - Considerations on future logical access control strategies Michael Sorrento, SES (Confirmed) Director Defense Manpower Data Center 10:20-11:00 *Keynote Remarks* Mitigating Cyber Risk through Enhanced Access Management Practices - Increasing network visibility to maintain access and control of networks - Opportunities to leverage advanced access management practices for greater cyber security - Collaboration strategies with mission partners that enable informed decision making processes Grant Schneider (Confirmed) Deputy Federal CISO Office of Management and Budget 11:00-11:30 Networking Break
6 11:30-12:10 Managing the Risk of Privileged Account & Privileged Passwords - Defend the targeted static privileged accounts by vaulting and keeping them moving - Rapidly PIV or CAC enable access to elevated privileges with full audit trail to meet compliance requirements and provide useful security data - Mitigate Pass-the-Hash vulnerability by removing access to passwords for privileged accounts - Reduce the need for large numbers of privileged accounts and provide the nonrepudiation link with PIV and CAC checkout Dan Conrad (Confirmed) Federal CTO One Identity, a Quest Software business 12:10-12:50 Leveraging Biometric Technologies and Strategies for Greater Homeland Defense 12:50-1:30 - Strategies to incorporate multi-modal biometric identity services - Considerations on future biometric strategies at USCIS - Initiatives supporting expansion of identity verification processes - Updates on future biometric technologies; what industry needs to know Lee Bowes (Confirmed) Chief, Biometrics Division USCIS Networking Lunch 1:30-2:10 Supporting Federal Government Cybersecurity Initiatives through Trusted Access Management - Updates on the FICAM Program; successes and next steps - Current access management initiatives and strategies that support Federal Cybersecurity efforts - GSA updates on ICAMSC and FPKI Tom Hallewell (Confirmed) FICAM Evangelist Identity Assurance and Trusted Access Division GSA Nandini Diamond (Confirmed) Deputy to the Director of Testing and Procurement Identity Assurance and Trusted Access Division GSA 2:10-2:50 Safeguarding America s Borders through Advanced Biometric Entry/Exit Systems - Updates on deployment of Entry/Exit Programs and lessons learned - Strategies to integrate mobile capabilities for CBP transformation - Initiatives to close biographic gaps for improved reporting and matching Colleen Manaher (Invited) Planning, Program Analysis & Evaluation Executive Director U.S. CBP
7 2:50-3:30 Face Recognition: Versatility, Accuracy, Evolution - Updates on current facial recognition capabilities - Considerations on future modality use - Mobile facial recognition considerations Patrick Grother (Confirmed) Computer Scientist NIST 3:30-3:40 Networking Break 3:40-4:20 Digital Forensics for Homeland Security - Face in video evaluation - Child exploitation, human trafficking, war criminals, gangs, etc. - Face, text, SMT, sensor pattern noise Patricia Wolfhope (Confirmed) PM, First Responders Group DHS 4:20-5:00 Biometric Technology Innovations and Research Initiatives at the CyLab Biometrics Center - Continuous authentication systems that leverage multi-modal identification capabilities - Access management initiatives that incorporate greater online security - Considerations on the use of biometrics identification on robots and UACVs - Facial recognition initiatives and advancements Marios Savvides (Confirmed) Director, CyLab Carnegie Mellon University 5:00 End of Symposium Topics & Speaker Times Subject to Edits LEAD DIAMOND SPONSOR: PLATINUM SPONSORS:
8 GOLD SPONSORS: MEDIA PARTNERS:
5 th Annual Identity Management Symposium
Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates
More information5 th Annual Identity Management Symposium
Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates
More information4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More information4th Annual. Multi-INT Exploitation Summit
Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary
More information13 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 13 th DoD/VA and Government HIT Summit* October 17-18, 2017 The Mary M. Gates Learning Center/ United Way: Alexandria, VA * This Summit is neither
More information6 th Annual U.S. Border Security and Intelligence Summit
Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:
More informationDefense Strategies Institute cordially invites you to an educational and training Summit:
Defense Strategies Institute cordially invites you to an educational and training Summit: Improving all- source intelligence and operational capabilities in a joint environment January 31 February 1, 2017:
More information14 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 14 th DoD/VA and Government HIT Summit* Developing a Connected Health IT Environment for Military and Government May 2-3, 2018 The Mary M. Gates
More information12 th DoD/VA and Government HIT Summit*
Defense Strategies Institute professional educational forum: 12 th DoD/VA and Government HIT Summit* ~Coordinating a Connected Health IT Environment for Military and Government~ May 31-June 1, 2017 The
More information6 th Annual U.S. Border Security and Intelligence Summit
Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:
More information2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021
2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.
More informationbordersecuritysummit.dsigroup.org
Leveraging Intelligence Sharing and New Solutions to Ensure National Security Speakers Include: Kevin McAleenan David Glawe Manuel Padilla, Jr. Jeffrey T. Walsh Commissioner Customs and Border Protection
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationWelcome to the Second Annual Intelligence & National Security Forum
Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence
More informationCyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation
Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED
More information2016 SPONSORSHIP OPPORTUNITIES
14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons
More informationCyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber
CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationNCCoE TRUSTED CLOUD: A SECURE SOLUTION
SESSION ID: SPO1-W14 NCCoE TRUSTED CLOUD: A SECURE SOLUTION Donna Dodson Associate Director Chief Cyber Security Advisor of the Information Technology Laboratory, Chief Cybersecurity Advisor for the National
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationPKI and FICAM Overview and Outlook
PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies
More informationDefense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility
Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous
More informationThe National Biometrics Challenge 2011 Update
The National Biometrics Challenge 2011 Update James Loudermilk Federal Bureau of Investigation Larry Hornak National Science Foundation Update Co-Chairs About the National Science and Technology Council
More informationIdentity Innovation: Requirements for Advanced Recognition, Processing, and Analytics for Government and Law Enforcement Applications
NEW FOR 2016: 10 YEARS OF ADVANCING IDENTITY TECHNOLOGY... January 25th-27th, 2016 Maryland Test Facility (MdTF) Site Tour NIEM Biometrics Training Sheraton Pentagon City, Arlington, VA Identity Innovation:
More informationDepartment of Homeland Security Science & Technology
Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T
More informationDoD Strategy for Cyber Resilient Weapon Systems
DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1
More informationTEL2813/IS2621 Security Management
TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information
More informationCOUNTERING IMPROVISED EXPLOSIVE DEVICES
COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour
More informationNDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.
NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. Dunlap@Raytheon.com This document does not contain technology or Technical Data controlled
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationCyber Security in Timothy Brown Dell Fellow and CTO Dell Security
Cyber Security in 2016 Timothy Brown Dell Fellow and CTO Dell Security 2016 The middle of a perfect storm Technology Driving Innovation Advanced Adversaries Limited Resources Dell Secureworks Underground
More informationBuild Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development
Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education
More informationBiometrics 101. Presented by The International Biometrics & Identification Association (IBIA)
Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce
More informationCryptologic and Cyber Systems Division
Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationSPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG
SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense
More informationHow to Plan, Procure & Deploy a PIV-Enabled PACS
How to Plan, Procure & Deploy a PIV-Enabled PACS Access Control Council Webinar Series Session Two: Facility Characteristics & Risk Assessment Introductions Randy Vanderhoof, Secure Technology Alliance
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More information4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
More informationRocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency
Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities
More informationNational Cyber Security and Cyber Terrorism Summit
Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing
More informationNational Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign
This document is scheduled to be published in the Federal Register on 11/29/2016 and available online at https://federalregister.gov/d/2016-28627, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE
More informationDefense Engineering Excellence
Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference
More informationCyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016
Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception
More informationTHE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE
THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationOPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30
OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.
More informationTestimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON
Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America
More informationGovernment IT Modernization and the Adoption of Hybrid Cloud
Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments
More informationSOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:
(Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:
More informationData to Decisions Terminate, Tolerate, Transfer, or Treat
I N S T I T U T E F O R D E F E N S E A N A L Y S E S Data to Decisions Terminate, Tolerate, Transfer, or Treat Laura A. Odell 25 July 2016 Approved for public release; distribution is unlimited. IDA Non-Standard
More informationDecember 5-6,
December 5-6, 2019 The Hyatt Hyatt Regency, Regency, Baltimore Baltimore Inner Inner Harbor, Harbor, MD MD The www.cybermarylandconference.com www.cybermarylandconference.com CyberMaryland @CyberMaryland
More informationU.S. Customs and Border Protection Cybersecurity Strategy
42% U.S. Customs and Border Protection Cybersecurity Strategy Enabling the Mission Through Secure Technology 19% 42% 19% 42% 41% 9% 19% 1% Table of Contents Message from the Commissioner Executive Summary
More informationYour Challenge. Our Priority.
Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software
More informationIncident response to a breach: Right of boom you find ashes
Incident response to a breach: Right of boom you find ashes Dr. Samuel Liles http://selil.com Opinions, or other information expressed are presenters and do not reflect current, former, future, or unaffiliated
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationOverview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive
More informationThe Office of Infrastructure Protection
The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess
More informationAir Entry/Exit Re-engineering (AEER)
Air Entry/Exit Re-engineering (AEER) Homeland Security Science & Technology Advisory Committee (HSSTAC) April 8, 2014 Bob Burns Director, Apex AEER Project Homeland Security Advanced Research Projects
More informationFederal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011
Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case
More informationPublished Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).
This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY
More informationDHS Cybersecurity: Services for State and Local Officials. February 2017
DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated
More informationExecutive Order on Coordinating National Resilience to Electromagnetic Pulses
Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE
More informationEvolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha
Evolving the Security Strategy for Growth Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Where Do We Start? Our History, Making History In late 2016,
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationStrengthening the Cybersecurity of Federal Networks and Critical Infrastructure
Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening
More informationENTERPRISE ARCHITECTURE
ENTERPRISE ARCHITECTURE Executive Summary With more than $1 billion in information technology investments annually, the Commonwealth of Pennsylvania has evolved into the equivalent of a Fortune 20 organization,
More informationMay 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations
May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose
More informationGood morning, Chairman Harman, Ranking Member Reichert, and Members of
Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,
More informationAdvanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin
Advanced Technology Academic Research Council Federal CISO Summit Ms. Thérèse Firmin Acting Deputy DoD CIO Cyber Security Department of Defense 25 January 2018 2 Overview Secretary Mattis Priorities Cybersecurity
More informationCybersecurity for State and Local Law Enforcement: A Roadmap to Enhance Capabilities
June 2016 Issue Brief # 2016-01 Cybersecurity for State and Local Law Enforcement: A Roadmap to Enhance Capabilities CYBERSECURITY FOR STATE AND LOCAL LAW ENFORCEMENT: A POLICY ROADMAP TO ENHANCE CAPABILITIES
More informationCybersecurity: Federalism as Defense-in-Depth
SESSION ID: Law-W08 Cybersecurity: Federalism as Defense-in-Depth MODERATOR: Gregory von Lehmen Special Assistant to the President, Cybersecurity University of Maryland University College (UMUC) PANELISTS:
More informationGovernment Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida
Government Contracting in a Tech-Savvy World October 30-31 2014 InterContinental Miami Miami, Florida 2014 Fall Program Government Contracting in a Tech-Savvy World October 30-31, 2014 InterContinental
More informationSecurity Survey Executive Summary October 2008
A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government
More informationSPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE
SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE ABOUT ISACA For more than 50 years, ISACA (isaca.org) has been a pace-setting global professionals lead, adapt and assure trust in an evolving digital
More informationSupplemental Programmatic Environmental Assessment (SPEA) for the Proposed
This document is scheduled to be published in the Federal Register on 12/15/2016 and available online at https://federalregister.gov/d/2016-30187, and on FDsys.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationElectronic Warfare: Innovation & Evolution in Global Electromagnetic Operations
Image Source: blueskyrotor.com 5-7 June 2018 Congrès Beaulieu, Lausanne Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations 2018 Exhibiting and ship Opportunities www.eweurope.com
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationNational Cybersecurity Center of Excellence
The 3rd Annual Intelligence and National Security Forum Jim McCarthy NIST / NCCoE 05/11/2018 This presentation is unclassified in its entirety Foundations Collaborative Hub The NCCoE assembles experts
More informationNational Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017
National Information Assurance Partnership (NIAP) 2017 Report NIAP continued to grow and make a difference in 2017 from increasing the number of evaluated products available for U.S. National Security
More informationSystems Engineering for Software Assurance
Systems Engineering for Software Assurance Kristen Baldwin Office of the Under Secretary of Defense Acquisition, Technology and Logistics Systems Engineering Software Assurance Scope: Software is fundamental
More informationSecuring the Internet of Things (IoT) at the U.S. Department of Veterans Affairs
Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationSecurity Program Design:
Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident
More informationFiXs - Federated and Secure Identity Management in Operation
FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems
More informationCyber Attacks & Breaches It s not if, it s When
` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,
More informationJanuary 23-25, 2012 Washington, DC
Presents a training conference: Best Value: Get the All Access Pass for the Two- Day Main Summit & Identity Management Focus Day! 5th Annual Biometrics for National Security TM and Defense Summit Enhancing
More information