Identity Management Symposium

Size: px
Start display at page:

Download "Identity Management Symposium"

Transcription

1 Defense Strategies Institute Professional Educational Forum: Identity Management Symposium Advancing Biometric and Identity Activity Solutions April 18-19, 2017: Mary M. Gates Learning Center Alexandria, VA

2 Program Design & Goal: To more accurately identify threats that pose risks to vital U.S. Interests, the U.S. Government is actively seeking improvements to their biometric, identity and access management capabilities in order to provide greater insight on the behavior, intent and actions of known and unknown threat actors. As the need to secure valuable information online grows exponentially, the U.S. Government and DoD will continue to implement greater identity management strategies and adopt biometric technologies that promote greater online security. The 2017 Identity Management Symposium will provide valuable information on the current and prospective initiatives that the U.S. Government supports in order to integrate advanced identity and access management practices for greater defense and security. The Symposium will also provide updates on the biometric initiatives and technologies that improve the efficiency and security of Government Organizations. DSI s team specializes in the extensive research and development of our Symposium's content and focus areas, and we will assemble the most respected minds in the community from operational leaders, the R&D Community, key policy-makers, as well as solution providers from Industry and Academia. Our non-partisan approach allows us to reach across all involved organizations bring together a truly holistic group of decision makers and solution providers. Operating Guidelines: DSI s Symposium directly supports DoD, DHS, and Government priorities by providing a conduit for officials to efficiently reach audiences outside of their respective offices that directly impact their department's mission success, at no charge to the government, and in an efficient expenditure of time. DSI s Symposium will provide a forum to address and improve internal and external initiatives, meet with and hear from partner organizations, disseminate vital capability requirements to industry, increase visibility within the larger community, and generally support their mission. * The Symposium is open and complimentary to all DoD and Federal employees and is considered an educational and training forum. * (Industry and academia members are charged a fee of attendance) Symposium is CLOSED TO PRESS / NO RECORDINGS General Target Audience: Identity Management, Biometrics, Access Management, Identity Activity, Cyber Security, Forensics, Identity Intelligence, Digital Forensics Specific topics to be discussed include: - Next-Generation Access Management and Credentialing Initiatives - Current and future Mobile Biometric Capabilities and Standards - Multi-Modal Authentication Initiatives and Updates - Identity Intelligence Information Exchange and Sharing Initiatives - Standardizing Online Identity Practices to Increase Verification and Security - Biometric Technology R&D Requirements and Focus Areas - Big Data Solutions to Bolster Identification Information Collection - Advancements to Biometric Search Capabilities - Cyber Security Considerations and Initiatives - Recognition Technology Strategies post US-VISIT/IDENT - Biometric Investment Priorities; Future Trends and Industry s Role - Digital Forensics Initiatives - Improvements to Biometric Matching and Reporting - Facilitating Best Biometric Practices for Greater Border Protection - RDT&E for Future Biometric Modalities

3 Topics & Speaker Times Subject to Edits April 18, :00-8:45 Registration and Light Breakfast Reception Open 8:45-9:00 Moderator Opening Remarks Benji Hutchinson (Confirmed) Senior Director, Washington, D.C. Operations NEC Corporation of America 9:00-9:50 Providing Timely Criminal Justice Information to Reduce Terrorist and Criminal Activity - Strategies to enhance information sharing capabilities with relevant mission partners - Cyber security considerations for information sharing - R&D efforts supporting greater interoperability for advanced information sharing James Loudermilk (Confirmed) Senior Level Technologist, CJIS FBI Marie E. Bernoi (Confirmed) Unit Chief, Identity Intelligence Unit Terrorist Screening Center, FBI 9:50-10:30 Enabling Identity Dominance on the Battlefield and Across the DoD - Updates on the BAT-A & DoD ABIS Programs and their future considerations - Strategies and initiatives to enhance data sharing capabilities with mission partners - Future acquisition priorities that support interoperable capabilities - Opportunities for industry COL Donald Hurst, USA (Confirmed) PM, DoD Biometrics PEO IEW&S 10:30-11:00 Networking Break 11:00-11:40 Advancing Identity Operations at the DoD for Enhanced National Security - Developing I2 capabilities to enhance intelligence analysis activities for JFCs and CCDRs support - Initiatives supporting greater forensic and biometric capabilities for DoD operations and activities - Identifying opportunities to enhance physical access control for DoD functions COL Dan McElroy, USA (Confirmed) Acting Director Defense Forensics and Biometrics Agency 11:40-12:20 Future Biometric & Identity Management Considerations at OBIM - Developing futures identity strategies - Considerations on future identity systems technology - Opportunities for industry John Boyd (Confirmed) Assistant Director, Futures Identity, OBIM DHS 12:20-1:00 Networking Lunch

4 1:00-1:40 Strengthening Identity Management Practices for Greater Access Management at the DoD - Updates on Cybersecurity Discipline Implementation Plan and its effect on current authentication capabilities - Developing a single identity standard to increase interoperability capabilities with mission partners and allies - Opportunities for industry: solutions for mobile capabilities and disconnected end users - Defining privileged access management frameworks Col Tom Clancy (Confirmed) Director, Identity Management Programs DoD 1:40-2:10 Identity and Account Protection - Establishing Identity as an important foundation to Cybersecurity - Enabling Multi Factor Authentication for higher security on legacy applications - Identity & Attribute Federation for finer grained authentication/authorization Joel Rader (Confirmed) Senior Solutions Architect Radiant Logic, Inc. 2:10-2:50 Department of Homeland Security, Biometric Policy and Strategy Considerations for the Future - Leveraging advanced credentialing methods for enhanced security capabilities - Current status of the DHS Biometric Framework DHS policy considerations for creating a DHS integrated biometrics enterprise Steve Yonkers (Confirmed) Director of Identity and Credentialing Screening Coordination Office, Office of Policy, DHS 2:50-3:10 Networking Break 3:10-3:50 Developing Digital Identity Security Capabilities for Individuals and Organizations at NIST - Updates on NSTIC program; the way ahead - Initiatives supporting advanced authentication measures for enhanced user privacy - Strategies to establish frameworks that enable objective measurement of identity solutions - Efforts to standardize identity practices Paul Grassi, CISSP (Confirmed) Senior Standards and Technology Advisor, NSTIC U.S. Department of Commerce, NIST 3:50-4:30 Leveraging Biometrics and Identity Management Strategies to Enforce Privacy Protections and Transparency for DHS Activities - Privacy compliance and information governance initiatives for DHS s biometric enterprise - Opportunities to leverage identity management capabilities for enhanced access control - Mission partner strategies for sharing and disseminating information Laurence Castelli (Confirmed) Senior Advisor to the Chief Privacy Officer Privacy Office, DHS

5 4:30-5:10 Identity Science and Technology Initiatives at CERDEC - Initiatives that promote enhanced search capabilities - Automated object recognition capability developments - Updates on requirements needed and where industry can assist Buane Delaine (Confirmed) Chief, Identity Intelligence Branch (I2WD) CERDEC April 19, :15-8:45 Registration and Light Breakfast Reception Open 8:45-9:00 Moderator Opening Remarks Benji Hutchinson (Confirmed) Senior Director, Washington, D.C. Operations NEC Corporation of America 9:00-9:40 Transforming Air Force Cybersecurity through Innovative Policy and Technologies - Leveraging advanced information security technologies to enhance the protection of critical Warfighter/Business information - Defending Air Force Networks through implementation of advanced defense tools - Risk management strategies that protect Airmen and USAF Core Missions Frank Konieczny, SES (Confirmed) Chief Technology Officer USAF 9:40-10:20 Enhancing Physical and Logical Access Control Measures to Advance DoD Security - Initiatives supporting greater physical access control - Strategies to enhance logical access control validation - Update on identification and authentication programs - Considerations on future logical access control strategies Michael Sorrento, SES (Confirmed) Director Defense Manpower Data Center 10:20-11:00 *Keynote Remarks* Mitigating Cyber Risk through Enhanced Access Management Practices - Increasing network visibility to maintain access and control of networks - Opportunities to leverage advanced access management practices for greater cyber security - Collaboration strategies with mission partners that enable informed decision making processes Grant Schneider (Confirmed) Deputy Federal CISO Office of Management and Budget 11:00-11:30 Networking Break

6 11:30-12:10 Managing the Risk of Privileged Account & Privileged Passwords - Defend the targeted static privileged accounts by vaulting and keeping them moving - Rapidly PIV or CAC enable access to elevated privileges with full audit trail to meet compliance requirements and provide useful security data - Mitigate Pass-the-Hash vulnerability by removing access to passwords for privileged accounts - Reduce the need for large numbers of privileged accounts and provide the nonrepudiation link with PIV and CAC checkout Dan Conrad (Confirmed) Federal CTO One Identity, a Quest Software business 12:10-12:50 Leveraging Biometric Technologies and Strategies for Greater Homeland Defense 12:50-1:30 - Strategies to incorporate multi-modal biometric identity services - Considerations on future biometric strategies at USCIS - Initiatives supporting expansion of identity verification processes - Updates on future biometric technologies; what industry needs to know Lee Bowes (Confirmed) Chief, Biometrics Division USCIS Networking Lunch 1:30-2:10 Supporting Federal Government Cybersecurity Initiatives through Trusted Access Management - Updates on the FICAM Program; successes and next steps - Current access management initiatives and strategies that support Federal Cybersecurity efforts - GSA updates on ICAMSC and FPKI Tom Hallewell (Confirmed) FICAM Evangelist Identity Assurance and Trusted Access Division GSA Nandini Diamond (Confirmed) Deputy to the Director of Testing and Procurement Identity Assurance and Trusted Access Division GSA 2:10-2:50 Safeguarding America s Borders through Advanced Biometric Entry/Exit Systems - Updates on deployment of Entry/Exit Programs and lessons learned - Strategies to integrate mobile capabilities for CBP transformation - Initiatives to close biographic gaps for improved reporting and matching Colleen Manaher (Invited) Planning, Program Analysis & Evaluation Executive Director U.S. CBP

7 2:50-3:30 Face Recognition: Versatility, Accuracy, Evolution - Updates on current facial recognition capabilities - Considerations on future modality use - Mobile facial recognition considerations Patrick Grother (Confirmed) Computer Scientist NIST 3:30-3:40 Networking Break 3:40-4:20 Digital Forensics for Homeland Security - Face in video evaluation - Child exploitation, human trafficking, war criminals, gangs, etc. - Face, text, SMT, sensor pattern noise Patricia Wolfhope (Confirmed) PM, First Responders Group DHS 4:20-5:00 Biometric Technology Innovations and Research Initiatives at the CyLab Biometrics Center - Continuous authentication systems that leverage multi-modal identification capabilities - Access management initiatives that incorporate greater online security - Considerations on the use of biometrics identification on robots and UACVs - Facial recognition initiatives and advancements Marios Savvides (Confirmed) Director, CyLab Carnegie Mellon University 5:00 End of Symposium Topics & Speaker Times Subject to Edits LEAD DIAMOND SPONSOR: PLATINUM SPONSORS:

8 GOLD SPONSORS: MEDIA PARTNERS:

5 th Annual Identity Management Symposium

5 th Annual Identity Management Symposium Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates

More information

5 th Annual Identity Management Symposium

5 th Annual Identity Management Symposium Defense Strategies Institute professional educational forum: 5 th Annual Identity Management Symposium Advancing Identity Intelligence and Biometric Solutions for Enhanced National Security Mary M. Gates

More information

4th Annual. Multi-INT Exploitation Summit

4th Annual. Multi-INT Exploitation Summit Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary

More information

4th Annual. Multi-INT Exploitation Summit

4th Annual. Multi-INT Exploitation Summit Defense Strategies Institute professional educational forum: 4th Annual Multi-INT Exploitation Summit ~Delivering Integrated Intelligence for Timely and Actionable Decision- Making~ July 18-19, 2018 Mary

More information

13 th DoD/VA and Government HIT Summit*

13 th DoD/VA and Government HIT Summit* Defense Strategies Institute professional educational forum: 13 th DoD/VA and Government HIT Summit* October 17-18, 2017 The Mary M. Gates Learning Center/ United Way: Alexandria, VA * This Summit is neither

More information

6 th Annual U.S. Border Security and Intelligence Summit

6 th Annual U.S. Border Security and Intelligence Summit Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:

More information

Defense Strategies Institute cordially invites you to an educational and training Summit:

Defense Strategies Institute cordially invites you to an educational and training Summit: Defense Strategies Institute cordially invites you to an educational and training Summit: Improving all- source intelligence and operational capabilities in a joint environment January 31 February 1, 2017:

More information

14 th DoD/VA and Government HIT Summit*

14 th DoD/VA and Government HIT Summit* Defense Strategies Institute professional educational forum: 14 th DoD/VA and Government HIT Summit* Developing a Connected Health IT Environment for Military and Government May 2-3, 2018 The Mary M. Gates

More information

12 th DoD/VA and Government HIT Summit*

12 th DoD/VA and Government HIT Summit* Defense Strategies Institute professional educational forum: 12 th DoD/VA and Government HIT Summit* ~Coordinating a Connected Health IT Environment for Military and Government~ May 31-June 1, 2017 The

More information

6 th Annual U.S. Border Security and Intelligence Summit

6 th Annual U.S. Border Security and Intelligence Summit Defense Strategies Institute professional educational forum: 6 th Annual U.S. Border Security and Intelligence Summit ~Enhancing Security through All-Source Intelligence Integration~ April 18-19, 2018:

More information

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021 Paper development coordinated by Brian Pittack, DHS/Immigrations and Customs Enforcement This is a community-developed document.

More information

bordersecuritysummit.dsigroup.org

bordersecuritysummit.dsigroup.org Leveraging Intelligence Sharing and New Solutions to Ensure National Security Speakers Include: Kevin McAleenan David Glawe Manuel Padilla, Jr. Jeffrey T. Walsh Commissioner Customs and Border Protection

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Welcome to the Second Annual Intelligence & National Security Forum

Welcome to the Second Annual Intelligence & National Security Forum Welcome to the Second Annual Intelligence & National Security Forum Today s Agenda 0800 0900 Registration and Light Breakfast 0900 0910 Opening Remarks Mr. Paul J. Geraci, Senior Director Intelligence

More information

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation COL Michael R. Corpening Deputy Chief, Operations Division (CCJ6-O) 1 December 2014 The overall classification of this brief is UNCLASSIFIED

More information

2016 SPONSORSHIP OPPORTUNITIES

2016 SPONSORSHIP OPPORTUNITIES 14 TH ANNUAL ARCHITECTING ENTERPRISE TRANSFORMATION SEPTEMBER 21, 2016 RENAISSANCE WASHINGTON DC DOWNTOWN HOTEL 2016 SPONSORSHIP OPPORTUNITIES One-On-One Access to Government s Enterprise Architects EDUCATION

More information

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better

More information

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Today s cyber threat landscape is evolving at a rate that is extremely aggressive, Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber Initiatives 30 January 2018 1 Agenda Federal Landscape Cybersecurity

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

NCCoE TRUSTED CLOUD: A SECURE SOLUTION

NCCoE TRUSTED CLOUD: A SECURE SOLUTION SESSION ID: SPO1-W14 NCCoE TRUSTED CLOUD: A SECURE SOLUTION Donna Dodson Associate Director Chief Cyber Security Advisor of the Information Technology Laboratory, Chief Cybersecurity Advisor for the National

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

National Strategy for CBRNE Standards

National Strategy for CBRNE Standards National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September

More information

PKI and FICAM Overview and Outlook

PKI and FICAM Overview and Outlook PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies

More information

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility Strategic Plan 2020 Addendum, April 2017 Our Agency, Our Mission, Our Responsibility [2] DSS Strategic Plan Addendum 2020 Addendum The DSS Strategic Plan 2020 is designed to support the agency s continuous

More information

The National Biometrics Challenge 2011 Update

The National Biometrics Challenge 2011 Update The National Biometrics Challenge 2011 Update James Loudermilk Federal Bureau of Investigation Larry Hornak National Science Foundation Update Co-Chairs About the National Science and Technology Council

More information

Identity Innovation: Requirements for Advanced Recognition, Processing, and Analytics for Government and Law Enforcement Applications

Identity Innovation: Requirements for Advanced Recognition, Processing, and Analytics for Government and Law Enforcement Applications NEW FOR 2016: 10 YEARS OF ADVANCING IDENTITY TECHNOLOGY... January 25th-27th, 2016 Maryland Test Facility (MdTF) Site Tour NIEM Biometrics Training Sheraton Pentagon City, Arlington, VA Identity Innovation:

More information

Department of Homeland Security Science & Technology

Department of Homeland Security Science & Technology Department of Homeland Security Science & Technology Overview to the US National Committee on Theoretical and Applied Mechanics, April 22, 2016, Washington DC Dr. Kevin L. Brown Chief Scientist, DHS/S&T

More information

DoD Strategy for Cyber Resilient Weapon Systems

DoD Strategy for Cyber Resilient Weapon Systems DoD Strategy for Cyber Resilient Weapon Systems Melinda K. Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Systems Engineering Conference October 2016 10/24/2016 Page-1

More information

TEL2813/IS2621 Security Management

TEL2813/IS2621 Security Management TEL2813/IS2621 Security Management James Joshi Associate Professor Lecture 4 + Feb 12, 2014 NIST Risk Management Risk management concept Goal to establish a relationship between aggregated risks from information

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

More information

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly. Dunlap@Raytheon.com This document does not contain technology or Technical Data controlled

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security Cyber Security in 2016 Timothy Brown Dell Fellow and CTO Dell Security 2016 The middle of a perfect storm Technology Driving Innovation Advanced Adversaries Limited Resources Dell Secureworks Underground

More information

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development Noel Kyle, Program Manager Department of Homeland Security (DHS) National Cybersecurity Education

More information

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA) Biometrics 101 Presented by The International Biometrics & Identification Association (IBIA) Mr. Benji Hutchinson MorphoTrust USA Senior Director, Federal Business 703-508-3864 jbhutchinson@morphotrust.com

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

Cryptologic and Cyber Systems Division

Cryptologic and Cyber Systems Division Cryptologic and Cyber Systems Division OVERALL BRIEFING IS Someone Scraped My Identity! Is There a Doctrine in the House? AF Identity, Credential, and Access Management (ICAM) August 2018 Mr. Richard Moon,

More information

Cybersecurity & Privacy Enhancements

Cybersecurity & Privacy Enhancements Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG THE WORLD S LEADING CYBERSECURITY AND IT SECURITY PROFESSIONAL ORGANIZATION How to face the immense

More information

How to Plan, Procure & Deploy a PIV-Enabled PACS

How to Plan, Procure & Deploy a PIV-Enabled PACS How to Plan, Procure & Deploy a PIV-Enabled PACS Access Control Council Webinar Series Session Two: Facility Characteristics & Risk Assessment Introductions Randy Vanderhoof, Secure Technology Alliance

More information

Cyber Security Program

Cyber Security Program Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by

More information

4A Healthcare Data Security & Privacy

4A Healthcare Data Security & Privacy 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits

More information

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities

More information

National Cyber Security and Cyber Terrorism Summit

National Cyber Security and Cyber Terrorism Summit Ottawa Ontario November 12-13 2014 National Cyber Security and Cyber Terrorism Summit SUPPORTERS Developing a Roadmap to Address the Pervasive Growth of Cyber Crime SUPPORTER RATE CARD Background The growing

More information

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign This document is scheduled to be published in the Federal Register on 11/29/2016 and available online at https://federalregister.gov/d/2016-28627, and on FDsys.gov Billing Code: 3510-13 DEPARTMENT OF COMMERCE

More information

Defense Engineering Excellence

Defense Engineering Excellence Defense Engineering Excellence Kristen J. Baldwin Principal Deputy Office of the Deputy Assistant Secretary of Defense for Systems Engineering, OUSD(AT&L) 18th Annual NDIA Systems Engineering Conference

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE Unisys Supporting Biometric Excellence through: 1. Vendor-agnostic system integration

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.

More information

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Testimony Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON Defending Our Democracy: Building Partnerships to Protect America

More information

Government IT Modernization and the Adoption of Hybrid Cloud

Government IT Modernization and the Adoption of Hybrid Cloud Government IT Modernization and the Adoption of Hybrid Cloud An IDC InfoBrief, Sponsored by VMware June 2018 Federal and National Governments Are at an Inflection Point Federal and national governments

More information

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES: (Solutions Brief) An integrated cybersecurity Administration solution for securing any Large Enterprise. The Industry s most complete protection for the Large Enterprise and Cloud Deployments. KEY SERVICES:

More information

Data to Decisions Terminate, Tolerate, Transfer, or Treat

Data to Decisions Terminate, Tolerate, Transfer, or Treat I N S T I T U T E F O R D E F E N S E A N A L Y S E S Data to Decisions Terminate, Tolerate, Transfer, or Treat Laura A. Odell 25 July 2016 Approved for public release; distribution is unlimited. IDA Non-Standard

More information

December 5-6,

December 5-6, December 5-6, 2019 The Hyatt Hyatt Regency, Regency, Baltimore Baltimore Inner Inner Harbor, Harbor, MD MD The www.cybermarylandconference.com www.cybermarylandconference.com CyberMaryland @CyberMaryland

More information

U.S. Customs and Border Protection Cybersecurity Strategy

U.S. Customs and Border Protection Cybersecurity Strategy 42% U.S. Customs and Border Protection Cybersecurity Strategy Enabling the Mission Through Secure Technology 19% 42% 19% 42% 41% 9% 19% 1% Table of Contents Message from the Commissioner Executive Summary

More information

Your Challenge. Our Priority.

Your Challenge. Our Priority. Your Challenge. Our Priority. Building trust and Confidence. When Federal managers and military leaders face tough challenges in cyber, data collection & analytics, enterprise IT or systems and software

More information

Incident response to a breach: Right of boom you find ashes

Incident response to a breach: Right of boom you find ashes Incident response to a breach: Right of boom you find ashes Dr. Samuel Liles http://selil.com Opinions, or other information expressed are presenters and do not reflect current, former, future, or unaffiliated

More information

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.

More information

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 PPD-21: CI Security and Resilience On February 12, 2013, President Obama signed Presidential Policy Directive

More information

The Office of Infrastructure Protection

The Office of Infrastructure Protection The Office of Infrastructure Protection National Protection and Programs Directorate Department of Homeland Security Organisation for the Prohibition of Chemical Weapons September 13, 2011 Overall Landscape

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess

More information

Air Entry/Exit Re-engineering (AEER)

Air Entry/Exit Re-engineering (AEER) Air Entry/Exit Re-engineering (AEER) Homeland Security Science & Technology Advisory Committee (HSSTAC) April 8, 2014 Bob Burns Director, Apex AEER Project Homeland Security Advanced Research Projects

More information

Federal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011

Federal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011 Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case

More information

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA). This document is scheduled to be published in the Federal Register on 03/22/2012 and available online at http://federalregister.gov/a/2012-06847, and on FDsys.gov 9110-9L DEPARTMENT OF HOMELAND SECURITY

More information

DHS Cybersecurity: Services for State and Local Officials. February 2017

DHS Cybersecurity: Services for State and Local Officials. February 2017 DHS Cybersecurity: Services for State and Local Officials February 2017 Department of Established in March of 2003 and combined 22 different Federal departments and agencies into a unified, integrated

More information

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Executive Order on Coordinating National Resilience to Electromagnetic Pulses Executive Order on Coordinating National Resilience to Electromagnetic Pulses The Wh... Page 1 of 11 EXECUTIVE ORDERS Executive Order on Coordinating National Resilience to Electromagnetic Pulses INFRASTRUCTURE

More information

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Eric Schlesinger Global Director and CISO Polaris Alpha Evolving the Security Strategy for Growth Where Do We Start? Our History, Making History In late 2016,

More information

Solutions Technology, Inc. (STI) Corporate Capability Brief

Solutions Technology, Inc. (STI) Corporate Capability Brief Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

ENTERPRISE ARCHITECTURE

ENTERPRISE ARCHITECTURE ENTERPRISE ARCHITECTURE Executive Summary With more than $1 billion in information technology investments annually, the Commonwealth of Pennsylvania has evolved into the equivalent of a Fortune 20 organization,

More information

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose

More information

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Good morning, Chairman Harman, Ranking Member Reichert, and Members of Statement of Michael C. Mines Deputy Assistant Director Directorate of Intelligence Federal Bureau of Investigation Before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment,

More information

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin Advanced Technology Academic Research Council Federal CISO Summit Ms. Thérèse Firmin Acting Deputy DoD CIO Cyber Security Department of Defense 25 January 2018 2 Overview Secretary Mattis Priorities Cybersecurity

More information

Cybersecurity for State and Local Law Enforcement: A Roadmap to Enhance Capabilities

Cybersecurity for State and Local Law Enforcement: A Roadmap to Enhance Capabilities June 2016 Issue Brief # 2016-01 Cybersecurity for State and Local Law Enforcement: A Roadmap to Enhance Capabilities CYBERSECURITY FOR STATE AND LOCAL LAW ENFORCEMENT: A POLICY ROADMAP TO ENHANCE CAPABILITIES

More information

Cybersecurity: Federalism as Defense-in-Depth

Cybersecurity: Federalism as Defense-in-Depth SESSION ID: Law-W08 Cybersecurity: Federalism as Defense-in-Depth MODERATOR: Gregory von Lehmen Special Assistant to the President, Cybersecurity University of Maryland University College (UMUC) PANELISTS:

More information

Government Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida

Government Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida Government Contracting in a Tech-Savvy World October 30-31 2014 InterContinental Miami Miami, Florida 2014 Fall Program Government Contracting in a Tech-Savvy World October 30-31, 2014 InterContinental

More information

Security Survey Executive Summary October 2008

Security Survey Executive Summary October 2008 A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government

More information

SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE

SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE ABOUT ISACA For more than 50 years, ISACA (isaca.org) has been a pace-setting global professionals lead, adapt and assure trust in an evolving digital

More information

Supplemental Programmatic Environmental Assessment (SPEA) for the Proposed

Supplemental Programmatic Environmental Assessment (SPEA) for the Proposed This document is scheduled to be published in the Federal Register on 12/15/2016 and available online at https://federalregister.gov/d/2016-30187, and on FDsys.gov 9110-9P DEPARTMENT OF HOMELAND SECURITY

More information

Cyber Resilience. Think18. Felicity March IBM Corporation

Cyber Resilience. Think18. Felicity March IBM Corporation Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations

Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations Image Source: blueskyrotor.com 5-7 June 2018 Congrès Beaulieu, Lausanne Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations 2018 Exhibiting and ship Opportunities www.eweurope.com

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

National Cybersecurity Center of Excellence

National Cybersecurity Center of Excellence The 3rd Annual Intelligence and National Security Forum Jim McCarthy NIST / NCCoE 05/11/2018 This presentation is unclassified in its entirety Foundations Collaborative Hub The NCCoE assembles experts

More information

National Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017

National Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017 National Information Assurance Partnership (NIAP) 2017 Report NIAP continued to grow and make a difference in 2017 from increasing the number of evaluated products available for U.S. National Security

More information

Systems Engineering for Software Assurance

Systems Engineering for Software Assurance Systems Engineering for Software Assurance Kristen Baldwin Office of the Under Secretary of Defense Acquisition, Technology and Logistics Systems Engineering Software Assurance Scope: Software is fundamental

More information

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs Dominic Cussatt Acting Deputy Assistant Secretary / Chief Information Security Officer (CISO) February 20, 2017 The Cyber

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Security Program Design:

Security Program Design: Security Program Design: A Critical Infrastructure Protection Model Experience, Dedication, and Leadership July 17-18, 2013 Toronto, Ontario CAN in Security EDUCATION Earn up to 16 CPEs Are you confident

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

Cyber Attacks & Breaches It s not if, it s When

Cyber Attacks & Breaches It s not if, it s When ` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,

More information

January 23-25, 2012 Washington, DC

January 23-25, 2012 Washington, DC Presents a training conference: Best Value: Get the All Access Pass for the Two- Day Main Summit & Identity Management Focus Day! 5th Annual Biometrics for National Security TM and Defense Summit Enhancing

More information