A standard for High-Assurance Identity for Healthcare and Pharmaceutical e-transactions
|
|
- Aubrey Morton
- 5 years ago
- Views:
Transcription
1 A standard for High-Assurance Identity for Healthcare and Pharmaceutical e-transactions Viky Manaila Managing Director, Trans Sped SRL ETSI ESI Workshop 3rd December 2013 Sophia-Antipolis
2 What is SAFE-BioPharma? A non-profit membership association formed by the worlds leading Pharmaceutical companies to create and manage the Digital Identity and Signature standard for Life Sciences and Healthcare The only industry-designed solution interoperable with NIH, FDA and other US federal agencies, and European Medicines Agency The only industry-designed standard that meets advanced e-signature requirements of the EU Directive 1999/93/EC and is compliant with HIPAA and DEA Federated identity across Federal Bridge Certification Authority SAFE-BioPharma Trust Authority maintains two trust standards and certifies identity providers to those standards (PKI and non-pki) PKI (Federal Bridge CA compliant) Level 3; compliant with ETSI standards on q- Certificates ; Trans Sped SAFE CA the root for q-certificates since 2008 Non-PKI SAFE-BioPharma is a Federal Identity Credentialing and Access Management (FICAM) Trust Framework Provider - NIST Levels 2, 3 Objective: to help industry protect its substantial information assets, move its business processes online, and become paperless in order to improve productivity, reduce costs, and lower time to market 2
3 FBCA cross-certified Identrust SA AZ Verizon Merck Lockhee d Martin Boeing EADS Raytheon CertiPath Bridge CA REBCA SAFE Bridge CA J&J SAFE:Verizon Symantec GSK Pharmas Northrop Grumman ARINC SITA CertiPath Common Policy Root CA DoE GPO DoJ Federal Bridge CA VeriSign Fed Common Policy Root CA VeriSign GPO US Treasury Entrust GSA MSO ORC DoL Exostar VDoT US PTO DoJ E-Commerce DoD Interoperability Root HUD NRC DoT DHS SSA NASA EOP Verizon Bus EPA HHS DEA USPS ACES Dept. of State State of Illinois DoD VA 3
4 SAFE-BioPharma Members, ie major global pharmaceutical companies, by creating SAFE BIO, acknowledged the enormous return on investment they can realize by shifting in-house, business-to-business and business-to-regulator transactions from paper-based to electronic. Data must be easily and quickly available, yet complaint with legal and regulatory requirements. This requires the use of legally enforceable, verifiable digital signatures and identity assurance mechanisms. Knowing that the identity of a business partner is valid, and that their signature will hold up in a court of law, is at the core of any business transaction and is critical to creating information liquidity. Documents/transactions shared with external parties in Europe or within the US federal government need the strength of a digital signature that is tightly bound to the identity of the signer. SAFE-BioPharma Association 4
5 significant administrative cost to the industry considerable complexity for external development partners and regulatory agencies does not support the rapid, cost-effective development of the services Bad timing with existing technologies/solutions; not correlated with the market needs Signatures in cloud/roaming zero footprint digital signatures should develop policy frameworks for operational interoperability should provide certifications to grow trust in the standards, products, and service deployments SAFE-BioPharma Association 5
6 Contact information Viky Manaila Mollie Shields Uehling CEO, SAFE-BioPharma biopharma.org/ org/ Watch the SAFE-BioPharma introductory video: 6
How does industry drive forward. SAFE-BioPharma Association
How does industry drive forward SAFE-BioPharma Association Topics! Topic C: Assurance levels, frameworks, interparty liability! Topic D: Device-specific methods: mobile; smartcards; browser DNT, etc. PKI,
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop Access Security Usage Models for PIV I Trusted Identity Credentials Roger Roehr
More informationMandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace.
Simplifying Compliance with the U.S. Government Federal Identity Mandate The first in a series of papers on HID Global ss Federal Identity Initiative and Delivery Strategy U.S. government agencies are
More informationHSPD-12 : The Role of Federal PKI
HSPD-12 : The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration judith.spencer@gsa.gov How We Got Here 2005 FIPS-201
More informationDepartment of Defense Public Key Infrastructure
Department of Defense Public Key Infrastructure DoD Approved External PKIs Master Document Version 5.6 January 26, 2016 Prepared for: DoD PKI Program Management Office 9800 Savage Road Suite 6718 Fort
More informationEstablishing Trust Across International Communities
Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.
More informationDepartment of Defense Public Key Infrastructure
Department of Defense Public Key Infrastructure DoD Approved External PKIs Master Document Version 4.6.1 22 August 2014 Prepared for: DoD PKI Program Management Office (PMO) Prepared by: Booz Allen Hamilton
More informationHigher Education PKI Initiatives
Higher Education PKI Initiatives (Scott Rea) Securing the ecampus - Hanover NH July 28, 2009 Overview What are the drivers for PKI in Higher Education? Stronger authentication to resources and services
More informationSAFE-BioPharma RAS Privacy Policy
SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what
More informationGovernment PKI Factors Influencing Architecture for the Equal Employment Opportunity Commission
Government PKI Factors Influencing Architecture for the Equal Employment Opportunity Commission December 14, 2000 Steve Bruck Khurram Chaudry Francis Yuan 1 EEOC Business Cases for PKI Citizens complaints
More informationCHIEF INFORMATION OFFICER
OFFICE OF THE CHIEF INFORMATION OFFICER DEPARTMENT OF HEALTH AND HUMAN SERVICES U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES HHS IT Direction & Priorities iti April 7, 2011 John Teeter Deputy Chief Information
More informationInteragency Advisory Board Meeting Agenda, July 28, 2010
Interagency Advisory Board Meeting Agenda, July 28, 2010 1. Opening Remarks 2 Research Collaboration in the Cloud: How NCI and Research Partners Are Improving Business Processes using Digital Identities
More informationPKI and FICAM Overview and Outlook
PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies
More informationThursday, May 15. Track D Security & Access Control
Thursday, May 15 Track D Security & Access Control Session: PKI Logical Access Technology & Applications Time: 10:15 AM 12:00 PM Room: W204 D Moderator: Steve Howard VP, Business Development, Identity
More informationUS Federal PKI Bridge. Ram Banerjee VP Vertical Markets
US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security
More informationNCS OVERVIEW: The Priority Service Programs. Presented to the U.S.-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP)
NCS OVERVIEW: The Priority Service Programs Presented to the U.S.-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) John W. Graves Acting Chief, Technology and Program Division
More informationSecurity Secure Information Sharing
ASD Convention Workshop 6 e-standards: a Strategic Asset across the Value Chain Security Secure Information Sharing Steve SHEPHERD Executive Director UK CeB Istanbul, 6 October 2011 1 Information security
More informationTechnology Aspects of Health Information Exchange. Steven E. Labkoff, MD, FACP Director, Pfizer Healthcare Informatics
Technology Aspects of Health Information Exchange Steven E. Labkoff, MD, FACP Director, Pfizer Healthcare Informatics Pfizer s Fair Health IT Principles Patient First: Patients rights and needs must drive
More informationThe Benefits of EPCS Beyond Compliance August 15, 2016
The Trusted Source for Secure Identity Solutions The Benefits of EPCS Beyond Compliance August 15, 2016 Presenters Sheila Loy Director Healthcare Solutions HID Global Joe Summanen Technical Architect Nemours
More informationISOO CUI Overview for ACSAC
ISOO CUI Overview for ACSAC Briefing Outline ISOO Overview Overview of the CUI Program CUI and IT Implementation CUI and NIST Standards and Guidelines NIST SP 800-171 CUI Approach for the Contractor Environment
More informationPartner Information Manager (PIM)
Partner Information Manager (PIM) User Guide Version 2.1 Exostar, LLC 04/21/2016 Copyright 2015 Exostar LLC. All rights reserved Page 1 Table of Contents PIM User Guide Accessing PIM... 3 Access Requirements...
More informationClick to edit Master title style
Federal Risk and Authorization Management Program Presenter Name: Peter Mell, Initial FedRAMP Program Manager FedRAMP Interagency Effort Started: October 2009 Created under the Federal Cloud Initiative
More informationStrategies for the Implementation of PIV I Secure Identity Credentials
Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual
More informationAssuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09
Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance
More informationGovernment-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA
Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA What is GUIRR? Joint body of the NAS, NAE, and IOM Created in 1984 to convene senior-most representatives
More informationFiXs - Federated and Secure Identity Management in Operation
FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems
More informationElectronic signature framework
R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents
More informationAn Introduction to DirectTrust
An Introduction to DirectTrust David C. Kibbe, MD MBA President and CEO, DirectTrust Senior Advisor, American Academy of Family Physicians Prepared HIMSS October 16, 2013 Goals for this brief presentation
More informationThe OMG GRC GRID. High Level Overview. Object Management Group GRC Program
The OMG GRC GRID High Level Overview Object Management Group GRC Program http://www.omg.org/ Introduction The Object Management Group was founded in 1989. Today, with over 470 member organizations, OMG
More informationHIPAA by the Numbers. Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation
HIPAA by the Numbers Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation Security vs Privacy Privacy right of a individual to control his/her personal information
More informationA Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction
A Market Solution to Online Identity Trust Background OIX is an Internet scale solution to the problem of how identity credentials can be trusted online. Background "OIX is the organization where different
More informationMedia Kit. For ad insertion or more information, contact
Advertise on the GovEvents site! 1 Media Kit For ad insertion or more information, contact advertise@govevents.com 703.212.3350 GovEvents is the web portal for all government events, created as a service
More informationSAFE-BIOPHARMA TECHNICAL NOTE Using SAFE-BioPharma Digital Signatures in Adobe Acrobat 9.0 and higher
SAFE-BIOPHARMA TECHNICAL NOTE 1101 Using SAFE-BioPharma Digital Signatures in Adobe Acrobat 9.0 and higher Introduction Replaces TechNote 1001 - Revised 17 February 2011 One of the more common uses for
More informationOASIS Electronic Trial Master File Standard Technical Committee
OASIS Electronic Trial Master File Standard Technical Committee Electronic and Digital Signatures Discussion March 3, 2014 9:00 10:00 AM PST Introducing Electronic and Digital Signatures Agenda Topic Presenter
More informationHighlights of Membership Data FY
Highlights of Membership Data FY 2014-2015 Denis Gray, Olena Leonchuk, Lindsey McGowen & Tim Michaelis IUCRC Evaluation Project at North Carolina State University July 2016 Membership Report Data 2014-2015
More informationElectronic and digital signatures in Adobe Sign for government.
Electronic and digital signatures in Adobe Sign for government. Adobe Sign lets you comply with local and international regulations using one scalable signature solution. A White Paper September 2017 TABLE
More information2011 NNI Environment, Health, and Safety Research Strategy
2011 NNI Environment, Health, and Safety Research Strategy Sally S. Tinkle, Ph.D. Deputy Director National Nanotechnology Coordination Office Coordinator for NNI EHS stinkle@nnco.nano.gov 1 Report Documentation
More informationShared Infrastructure for the Implementation of Homeland Security Presidential Directive 12
Shared Infrastructure for the Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy Smart Card Alliance
More informationS&I Framework Initiatives
S&I Framework Initiatives HIT Standards Committee Update August 17, 2011 Introduction and Context The Standards & Interoperability (S&I) Framework: Creates a collaborative, coordinated, incremental standards
More informationMobile Validation Solutions
227 Mobile Validation Solutions John Bys Executive Vice President Copyright 2007, CoreStreet, Ltd. Who has requirements? Maritime Safety Transportation Act Ports / MTSA Facilities Vehicle check points
More informationSecuring Your Data ATA Spec 42. Regan Brossard - The Boeing Company June 2017
Securing Your Data ATA Spec 42 Regan Brossard - The Boeing Company June 2017 Agenda PKI - Use in the Aviation Industry and why is it necessary Guidance for Transitioning to Connected Airplanes Choosing
More informationTechnical Trust Policy
Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality
More informationComparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition
Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,
More informationThird public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy
Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:
More informationAdobe Sign and 21 CFR Part 11
Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted
More informationHigh Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail
High Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail November 20, 2008 Chris Greer Director, US National Coordination Office Networking and Information Technology Research
More informationThe current status of Esi TC and the future of electronic signatures
SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The
More informationInteragency Advisory Board Meeting Agenda, February 2, 2009
Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,
More informationNext Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop
Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual
More informationThe U.S. Manufacturing Extension Partnership - MEP
The U.S. Manufacturing Extension Partnership - MEP Roger D. Kilmer Director, MEP National Institute of Standards and Technology (NIST) U.S. Department of Commerce roger.kilmer@nist.gov 301-975-5020 http://www.nist.gov/mep/
More informationFederal PKI. Trust Store Management Guide
Federal PKI Trust Store Management Guide V1.0 September 21, 2015 FINAL Disclaimer The Federal PKI Management Authority (FPKIMA) has designed and created the Trust Store Management Guide as an education
More informationSecure Government Computing Initiatives & SecureZIP
Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS
More informationNational Strategy for CBRNE Standards
National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September
More informationSecure Messaging Mobile App Privacy Policy. Privacy Policy Highlights
Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review
More informationDelivering Certificates or Trust Building Robust PKIs Alan T Liddle Msc BSc PgDip FBCS CEng CITP AMP MIMMM
Delivering Certificates or Trust Building Robust PKIs Alan T Liddle Msc BSc PgDip FBCS CEng CITP AMP MIMMM Trustis Limited Building 273 Greenham Business Park RG19 6HN Agenda Introduction PKI Standards
More informationeidas Regulation eid and assurance levels Outcome of eias study
eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification
More informationEuropean Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission
European Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission Key EU Policy Milestones to deliver C-ITS in Europe by 2019 Cooperative Intelligent Transport Systems A European
More informationManaged Access Gateway Third-Party Credential User Guide August 2017
Managed Access Gateway Third-Party Credential User Guide August 2017 Copyright 2017 Exostar, LLC All rights reserved 1 Contents Audience... 3 How to Register for a New MAG Account with your Third-Party
More informationControlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:
Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information
More informationLEGISLATION UPDATE Updates on EU Data Protection Regulation, Patient Privacy and Consent 10 Things Every Bio/Pharma Need to Know Now
LEGISLATION UPDATE Updates on EU Data Protection Regulation, Patient Privacy and Consent 10 Things Every Bio/Pharma Need to Know Now CBI Global Life Science Compliance Meeting November 16, 2016 Contents
More informationDigital Solutions. January, 2016
Digital Solutions January, 2016 This document provides an outline of a presentation and is incomplete without the accompanying oral commentary and discussion. Conclusions and/ or potential strategies contained
More informationFPKIPA CPWG Antecedent, In-Person Task Group
FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent
More informationNATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,
More informationPartner Information Manager Supplier Guide October 2017
Partner Information Manager Supplier Guide October 2017 Copyright 2017 Exostar, LLC All rights reserved. Contents Exostar s Partner Information Manager (PIM)... 2 Cybersecurity Questionnaire... 2 NIST
More informationGovernment support for Industry Consortia and why it matters. IIS/O5 hosted by DIACC, Ottawa November 2, 2016
Government support for Industry Consortia and why it matters IIS/O5 hosted by DIACC, Ottawa November 2, 2016 Setting the scene Canada has competitive advantage in digital identity (but let s not talk about
More informationRequiring Digital Signatures and Certificates
DocuSign Quick Start Guide Requiring Digital Signatures and Certificates Overview If you are doing business in an industry or region of the world that demands digital signatures, you can leverage DocuSign
More informationCertificate. Certificate number: Certified by EY CertifyPoint since: July 10, 2018
Certificate Certificate number: 2018-016 Certified by EY CertifyPoint since: July 10, 2018 Based on certification examination in conformity with defined requirements in ISO/IEC 17065:2012 and ETSI EN 319
More informationInteragency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008
Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal
More informationScaling Interoperable Trust through a Trustmark Marketplace
Scaling Interoperable Trust through a Marketplace John Wandelt Georgia Tech Research Institute This work was performed under the following financial assistance award 70NANB13H189 from the U.S. Department
More informationEU General Data Protection Regulation (GDPR) Achieving compliance
EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,
More informationFederal Identity Credentialing: State of Play
Federal Identity Credentialing: State of Play Smart Card Alliance Annual Forum October 19, 2004 Judith Spencer U.S. General Services Administration judith.spencer@gsa.gov PMC E-Government Agenda Government
More information1 Hitachi ID Access Certifier. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Hitachi ID Access Certifier Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Periodic review and cleanup of security entitlements. 2 Agenda Hitachi ID corporate overview.
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationNIJ and Personnel Location Precision Indoor Personnel Location and Tracking for Emergency Responders Technology Workshop August 7 & 8, 2006
NIJ and Personnel Location Precision Indoor Personnel Location and Tracking for Emergency Responders Technology Workshop August 7 & 8, 2006 Joe Heaps Portfolio Manager, CommTech Office of Science and Technology
More informationSmart Cards & Credentialing in the Federal Government
Smart Cards & Credentialing in the Federal Government Smart Card Alliance 13 Feb 2003 Salt Lake City Bill Holcombe GSA Office of Governmentwide Policy New Urgency for Credentialing Solutions Post 9/11
More informationAB1-3 Keeping People Safe and Secure in Federal Facilities
May 13-14, 2014 Walter E. Washington Convention Center Washington, DC AB1-3 Keeping People Safe and Secure in Federal Facilities Bernard Holt, Deputy Executive Director & Lindsey Blair, Senior Program
More informationQMS in the ISO World: ISO 9001 and ISO Certification and Accreditation. Quality Confab. 3 November, Dan Tholen, M.S.
QMS in the ISO World: ISO 9001 and ISO 15189 - Certification and Accreditation Quality Confab 3 November, 2010 Dan Tholen, M.S. A2LA Presentation topics ISO 9001 vs 15189 In a nutshell Conformity Assessment
More informationIT Security Evaluation : Common Criteria
AfriNIC-9 MEETING Mauritius 22-28 November 2008 IT Security Evaluation : Common Criteria Ministry of Communication Technologies National Digital Certification Agency Mounir Ferjani November 2008 afrinic
More informationCertiPath TrustVisitor and TrustManager. The need for visitor management in FICAM Compliant PACS
CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant PACS CertiPath TrustMonitor CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant
More informationA Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances
A Quick Guide to EPCS What You Need to Know to Implement Electronic Prescriptions for Controlled Substances Many healthcare providers have delayed implementing electronic prescriptions for controlled substances
More informationGlobal cybersecurity and international standards
World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level
More informationLeveraging the LincPass in USDA
Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass
More informationIMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES
IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data
More informationThe Software Assurance Ecosystem: OMG s Approach to Systems & Software Assurance
The Software Assurance Ecosystem: OMG s Approach to Systems & Software Assurance Dr. Richard Mark Soley Chairman and CEO Object Management Group, Inc. With thanks to the OMG Systems Assurance Domain Task
More informationCMS Contractor PIV Credentialing Focus & Role of EFI
HSPD-12 IDENTITY & CREDENTIALING MANAGEMENT (ICM) COUNCIL HSPD-12 @ CMS Contractor PIV Credentialing Focus & Role of EFI CSCOUT - August 2018 8/1/18 18/1/18 Discussion Topics Why are we doing this? How
More informationGeneral Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant
General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall
More informationDirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure
DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-
More informationDoD & FiXs : Identity Superiority
DoD & FiXs : Identity Superiority Implementing common authentication now & into the future. The Federation for Identity and Cross-Credentialing Systems (FiXs) www.fixs.org FiXs - The Federation for Identity
More informationMobile Performance Support and Training within the U.S. Federal Government
606 Mobile Performance Support and Training within the U.S. Federal Government June 21 23, 2011 San Jose, CA John Low, Carney, Inc. D0D: 242+ Fed: 124+ Army: 232+ NASA 10+ SI 8+ NIH 42+ There are over
More informationModernising the public sector through the cloud
Modernising the public sector through the cloud Alison Gillwald (PhD) & Mpho Moyo Executive Director: Research ICT Africa RIA Associate Adjunct Professor: University of Cape Town RIA Workshop RANICTP2
More informationAlphaTrust PRONTO - Transaction Processing Overview
AlphaTrust PRONTO - Transaction Processing Overview 1 / 16 Table of contents Transaction Processing Overview... 3 Product Overview... 4 Transaction Processing... 6 Commentary... 8 Document Format Requirements...
More informationlocuz.com SOC Services
locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security
More informationA Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud
A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,
More informationTrusted Identities That Drive Global Commerce
Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance
More informationLast Updated 12/11/2015. LM Procure to Pay Quick Reference Guide For Suppliers Completing a Registration Request
Last Updated 12/11/2015 LM Procure to Pay Quick Reference Guide For Suppliers Completing a Registration Request Lockheed Martin Procure to Pay Revised December 2015 Procedure This quick reference guide
More informationStreamlined FISMA Compliance For Hosted Information Systems
Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and
More informationAUDIT GUIDELINES FOR A GOV TSP TSP OF THE BASQUE ADMINISTRATION
AUDIT GUIDELINES FOR A GOV TSP TSP OF THE BASQUE ADMINISTRATION IZENPE: A GOV TSP Created in 2003. Owners: Basque Government and Regional Governments of the Basque Country ISO 27001, ETSI TS 101 456 and
More informationTRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model
TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model
More informationHow the SBIR/STTR Programs Help Grow Your Businesses
Click to edit Master title style How the SBIR/STTR Programs Help Grow Your Businesses 1 Click Jerry to Alfonso edit Master Miles, title Esq. style Experience Jerry Miles, a government contracts attorney
More informationPharma IT ELECTRONIC RECORDS
Pharma IT ELECTRONIC RECORDS Excerpted from Pharmaceutical Formulation & Quality (PFQ) magazine, February/March 2008 E-Signatures Set the Standard E-signatures can improve access to documents and information
More information