A standard for High-Assurance Identity for Healthcare and Pharmaceutical e-transactions

Size: px
Start display at page:

Download "A standard for High-Assurance Identity for Healthcare and Pharmaceutical e-transactions"

Transcription

1 A standard for High-Assurance Identity for Healthcare and Pharmaceutical e-transactions Viky Manaila Managing Director, Trans Sped SRL ETSI ESI Workshop 3rd December 2013 Sophia-Antipolis

2 What is SAFE-BioPharma? A non-profit membership association formed by the worlds leading Pharmaceutical companies to create and manage the Digital Identity and Signature standard for Life Sciences and Healthcare The only industry-designed solution interoperable with NIH, FDA and other US federal agencies, and European Medicines Agency The only industry-designed standard that meets advanced e-signature requirements of the EU Directive 1999/93/EC and is compliant with HIPAA and DEA Federated identity across Federal Bridge Certification Authority SAFE-BioPharma Trust Authority maintains two trust standards and certifies identity providers to those standards (PKI and non-pki) PKI (Federal Bridge CA compliant) Level 3; compliant with ETSI standards on q- Certificates ; Trans Sped SAFE CA the root for q-certificates since 2008 Non-PKI SAFE-BioPharma is a Federal Identity Credentialing and Access Management (FICAM) Trust Framework Provider - NIST Levels 2, 3 Objective: to help industry protect its substantial information assets, move its business processes online, and become paperless in order to improve productivity, reduce costs, and lower time to market 2

3 FBCA cross-certified Identrust SA AZ Verizon Merck Lockhee d Martin Boeing EADS Raytheon CertiPath Bridge CA REBCA SAFE Bridge CA J&J SAFE:Verizon Symantec GSK Pharmas Northrop Grumman ARINC SITA CertiPath Common Policy Root CA DoE GPO DoJ Federal Bridge CA VeriSign Fed Common Policy Root CA VeriSign GPO US Treasury Entrust GSA MSO ORC DoL Exostar VDoT US PTO DoJ E-Commerce DoD Interoperability Root HUD NRC DoT DHS SSA NASA EOP Verizon Bus EPA HHS DEA USPS ACES Dept. of State State of Illinois DoD VA 3

4 SAFE-BioPharma Members, ie major global pharmaceutical companies, by creating SAFE BIO, acknowledged the enormous return on investment they can realize by shifting in-house, business-to-business and business-to-regulator transactions from paper-based to electronic. Data must be easily and quickly available, yet complaint with legal and regulatory requirements. This requires the use of legally enforceable, verifiable digital signatures and identity assurance mechanisms. Knowing that the identity of a business partner is valid, and that their signature will hold up in a court of law, is at the core of any business transaction and is critical to creating information liquidity. Documents/transactions shared with external parties in Europe or within the US federal government need the strength of a digital signature that is tightly bound to the identity of the signer. SAFE-BioPharma Association 4

5 significant administrative cost to the industry considerable complexity for external development partners and regulatory agencies does not support the rapid, cost-effective development of the services Bad timing with existing technologies/solutions; not correlated with the market needs Signatures in cloud/roaming zero footprint digital signatures should develop policy frameworks for operational interoperability should provide certifications to grow trust in the standards, products, and service deployments SAFE-BioPharma Association 5

6 Contact information Viky Manaila Mollie Shields Uehling CEO, SAFE-BioPharma biopharma.org/ org/ Watch the SAFE-BioPharma introductory video: 6

How does industry drive forward. SAFE-BioPharma Association

How does industry drive forward. SAFE-BioPharma Association How does industry drive forward SAFE-BioPharma Association Topics! Topic C: Assurance levels, frameworks, interparty liability! Topic D: Device-specific methods: mobile; smartcards; browser DNT, etc. PKI,

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop Access Security Usage Models for PIV I Trusted Identity Credentials Roger Roehr

More information

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace.

Mandate. Delivery. with evolving. Management and credentials. Government Federal Identity. and. Compliance. using. pivclasss replace. Simplifying Compliance with the U.S. Government Federal Identity Mandate The first in a series of papers on HID Global ss Federal Identity Initiative and Delivery Strategy U.S. government agencies are

More information

HSPD-12 : The Role of Federal PKI

HSPD-12 : The Role of Federal PKI HSPD-12 : The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration judith.spencer@gsa.gov How We Got Here 2005 FIPS-201

More information

Department of Defense Public Key Infrastructure

Department of Defense Public Key Infrastructure Department of Defense Public Key Infrastructure DoD Approved External PKIs Master Document Version 5.6 January 26, 2016 Prepared for: DoD PKI Program Management Office 9800 Savage Road Suite 6718 Fort

More information

Establishing Trust Across International Communities

Establishing Trust Across International Communities Establishing Trust Across International Communities 6 Feb 2013 info@federatedbusiness.org www.federatedbusiness.org Proprietary - British Business Federation Authority 1 Strategic Drivers - Industry 1.

More information

Department of Defense Public Key Infrastructure

Department of Defense Public Key Infrastructure Department of Defense Public Key Infrastructure DoD Approved External PKIs Master Document Version 4.6.1 22 August 2014 Prepared for: DoD PKI Program Management Office (PMO) Prepared by: Booz Allen Hamilton

More information

Higher Education PKI Initiatives

Higher Education PKI Initiatives Higher Education PKI Initiatives (Scott Rea) Securing the ecampus - Hanover NH July 28, 2009 Overview What are the drivers for PKI in Higher Education? Stronger authentication to resources and services

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

Government PKI Factors Influencing Architecture for the Equal Employment Opportunity Commission

Government PKI Factors Influencing Architecture for the Equal Employment Opportunity Commission Government PKI Factors Influencing Architecture for the Equal Employment Opportunity Commission December 14, 2000 Steve Bruck Khurram Chaudry Francis Yuan 1 EEOC Business Cases for PKI Citizens complaints

More information

CHIEF INFORMATION OFFICER

CHIEF INFORMATION OFFICER OFFICE OF THE CHIEF INFORMATION OFFICER DEPARTMENT OF HEALTH AND HUMAN SERVICES U.S. DEPARTMENT OF HEALTH AND HUMAN SERVICES HHS IT Direction & Priorities iti April 7, 2011 John Teeter Deputy Chief Information

More information

Interagency Advisory Board Meeting Agenda, July 28, 2010

Interagency Advisory Board Meeting Agenda, July 28, 2010 Interagency Advisory Board Meeting Agenda, July 28, 2010 1. Opening Remarks 2 Research Collaboration in the Cloud: How NCI and Research Partners Are Improving Business Processes using Digital Identities

More information

PKI and FICAM Overview and Outlook

PKI and FICAM Overview and Outlook PKI and FICAM Overview and Outlook Stepping Stones 2001 FPKIPA Established Federal Bridge CA established 2003 E-Authentication Program Established M-04-04 E-Authentication Guidance for Federal Agencies

More information

Thursday, May 15. Track D Security & Access Control

Thursday, May 15. Track D Security & Access Control Thursday, May 15 Track D Security & Access Control Session: PKI Logical Access Technology & Applications Time: 10:15 AM 12:00 PM Room: W204 D Moderator: Steve Howard VP, Business Development, Identity

More information

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets

US Federal PKI Bridge. Ram Banerjee VP Vertical Markets US Federal PKI Bridge Ram Banerjee VP Vertical Markets e-gov and PKI Drivers Government Paperwork Elimination and ESIGN Acts Public Expectations Long-term Cost Savings The Need for Privacy and Security

More information

NCS OVERVIEW: The Priority Service Programs. Presented to the U.S.-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP)

NCS OVERVIEW: The Priority Service Programs. Presented to the U.S.-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) NCS OVERVIEW: The Priority Service Programs Presented to the U.S.-Japan Experts Workshop on Critical Information Infrastructure Protection (CIIP) John W. Graves Acting Chief, Technology and Program Division

More information

Security Secure Information Sharing

Security Secure Information Sharing ASD Convention Workshop 6 e-standards: a Strategic Asset across the Value Chain Security Secure Information Sharing Steve SHEPHERD Executive Director UK CeB Istanbul, 6 October 2011 1 Information security

More information

Technology Aspects of Health Information Exchange. Steven E. Labkoff, MD, FACP Director, Pfizer Healthcare Informatics

Technology Aspects of Health Information Exchange. Steven E. Labkoff, MD, FACP Director, Pfizer Healthcare Informatics Technology Aspects of Health Information Exchange Steven E. Labkoff, MD, FACP Director, Pfizer Healthcare Informatics Pfizer s Fair Health IT Principles Patient First: Patients rights and needs must drive

More information

The Benefits of EPCS Beyond Compliance August 15, 2016

The Benefits of EPCS Beyond Compliance August 15, 2016 The Trusted Source for Secure Identity Solutions The Benefits of EPCS Beyond Compliance August 15, 2016 Presenters Sheila Loy Director Healthcare Solutions HID Global Joe Summanen Technical Architect Nemours

More information

ISOO CUI Overview for ACSAC

ISOO CUI Overview for ACSAC ISOO CUI Overview for ACSAC Briefing Outline ISOO Overview Overview of the CUI Program CUI and IT Implementation CUI and NIST Standards and Guidelines NIST SP 800-171 CUI Approach for the Contractor Environment

More information

Partner Information Manager (PIM)

Partner Information Manager (PIM) Partner Information Manager (PIM) User Guide Version 2.1 Exostar, LLC 04/21/2016 Copyright 2015 Exostar LLC. All rights reserved Page 1 Table of Contents PIM User Guide Accessing PIM... 3 Access Requirements...

More information

Click to edit Master title style

Click to edit Master title style Federal Risk and Authorization Management Program Presenter Name: Peter Mell, Initial FedRAMP Program Manager FedRAMP Interagency Effort Started: October 2009 Created under the Federal Cloud Initiative

More information

Strategies for the Implementation of PIV I Secure Identity Credentials

Strategies for the Implementation of PIV I Secure Identity Credentials Strategies for the Implementation of PIV I Secure Identity Credentials A Smart Card Alliance Educational Institute Workshop PIV Technology and Policy Requirements Steve Rogers President & CEO 9 th Annual

More information

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09

Assuring Identity. The Identity Assurance Framework CTST Conference, New Orleans, May-09 Assuring Identity The Identity Assurance Framework CTST Conference, New Orleans, May-09 Brett McDowell, Executive Director, Liberty Alliance email@brettmcdowell +1-413-652-1248 1 150+ Liberty Alliance

More information

Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA

Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA Government-University-Industry Research Roundtable (GUIRR) Update FDP Meeting May 14-15, 2009 Irvine, CA What is GUIRR? Joint body of the NAS, NAE, and IOM Created in 1984 to convene senior-most representatives

More information

FiXs - Federated and Secure Identity Management in Operation

FiXs - Federated and Secure Identity Management in Operation FiXs - Federated and Secure Identity Management in Operation Implementing federated identity management and assurance in operational scenarios The Federation for Identity and Cross-Credentialing Systems

More information

Electronic signature framework

Electronic signature framework R E P U B L I C O F S E R B I A Negotation Team for the Accession of Republic of Serbia to the European Union Working Group for Chapter 10 Information society and media Electronic signature framework Contents

More information

An Introduction to DirectTrust

An Introduction to DirectTrust An Introduction to DirectTrust David C. Kibbe, MD MBA President and CEO, DirectTrust Senior Advisor, American Academy of Family Physicians Prepared HIMSS October 16, 2013 Goals for this brief presentation

More information

The OMG GRC GRID. High Level Overview. Object Management Group GRC Program

The OMG GRC GRID. High Level Overview. Object Management Group GRC Program The OMG GRC GRID High Level Overview Object Management Group GRC Program http://www.omg.org/ Introduction The Object Management Group was founded in 1989. Today, with over 470 member organizations, OMG

More information

HIPAA by the Numbers. Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation

HIPAA by the Numbers. Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation HIPAA by the Numbers Presented by: Mark L. Schuweiler Director of Global Information Assurance Services EDS Corporation Security vs Privacy Privacy right of a individual to control his/her personal information

More information

A Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction

A Market Solution to Online Identity Trust. Trust Frameworks 101: An Introduction A Market Solution to Online Identity Trust Background OIX is an Internet scale solution to the problem of how identity credentials can be trusted online. Background "OIX is the organization where different

More information

Media Kit. For ad insertion or more information, contact

Media Kit. For ad insertion or more information, contact Advertise on the GovEvents site! 1 Media Kit For ad insertion or more information, contact advertise@govevents.com 703.212.3350 GovEvents is the web portal for all government events, created as a service

More information

SAFE-BIOPHARMA TECHNICAL NOTE Using SAFE-BioPharma Digital Signatures in Adobe Acrobat 9.0 and higher

SAFE-BIOPHARMA TECHNICAL NOTE Using SAFE-BioPharma Digital Signatures in Adobe Acrobat 9.0 and higher SAFE-BIOPHARMA TECHNICAL NOTE 1101 Using SAFE-BioPharma Digital Signatures in Adobe Acrobat 9.0 and higher Introduction Replaces TechNote 1001 - Revised 17 February 2011 One of the more common uses for

More information

OASIS Electronic Trial Master File Standard Technical Committee

OASIS Electronic Trial Master File Standard Technical Committee OASIS Electronic Trial Master File Standard Technical Committee Electronic and Digital Signatures Discussion March 3, 2014 9:00 10:00 AM PST Introducing Electronic and Digital Signatures Agenda Topic Presenter

More information

Highlights of Membership Data FY

Highlights of Membership Data FY Highlights of Membership Data FY 2014-2015 Denis Gray, Olena Leonchuk, Lindsey McGowen & Tim Michaelis IUCRC Evaluation Project at North Carolina State University July 2016 Membership Report Data 2014-2015

More information

Electronic and digital signatures in Adobe Sign for government.

Electronic and digital signatures in Adobe Sign for government. Electronic and digital signatures in Adobe Sign for government. Adobe Sign lets you comply with local and international regulations using one scalable signature solution. A White Paper September 2017 TABLE

More information

2011 NNI Environment, Health, and Safety Research Strategy

2011 NNI Environment, Health, and Safety Research Strategy 2011 NNI Environment, Health, and Safety Research Strategy Sally S. Tinkle, Ph.D. Deputy Director National Nanotechnology Coordination Office Coordinator for NNI EHS stinkle@nnco.nano.gov 1 Report Documentation

More information

Shared Infrastructure for the Implementation of Homeland Security Presidential Directive 12

Shared Infrastructure for the Implementation of Homeland Security Presidential Directive 12 Shared Infrastructure for the Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy Smart Card Alliance

More information

S&I Framework Initiatives

S&I Framework Initiatives S&I Framework Initiatives HIT Standards Committee Update August 17, 2011 Introduction and Context The Standards & Interoperability (S&I) Framework: Creates a collaborative, coordinated, incremental standards

More information

Mobile Validation Solutions

Mobile Validation Solutions 227 Mobile Validation Solutions John Bys Executive Vice President Copyright 2007, CoreStreet, Ltd. Who has requirements? Maritime Safety Transportation Act Ports / MTSA Facilities Vehicle check points

More information

Securing Your Data ATA Spec 42. Regan Brossard - The Boeing Company June 2017

Securing Your Data ATA Spec 42. Regan Brossard - The Boeing Company June 2017 Securing Your Data ATA Spec 42 Regan Brossard - The Boeing Company June 2017 Agenda PKI - Use in the Aviation Industry and why is it necessary Guidance for Transitioning to Connected Airplanes Choosing

More information

Technical Trust Policy

Technical Trust Policy Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality

More information

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition

Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition Comparison of Electronic Signature between Europe and Japan: Possibiltiy of Mutual Recognition 1 Soshi Hamaguchi, 1 Toshiyuki Kinoshita, 2 Satoru Tezuka 1 Tokyo University of Technology, Tokyo, Japan,

More information

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy 14 February 2017 Amsterdam Gerhard Menzel European Commission - DG MOVE Scope:

More information

Adobe Sign and 21 CFR Part 11

Adobe Sign and 21 CFR Part 11 Adobe Sign and 21 CFR Part 11 Today, organizations of all sizes are transforming manual paper-based processes into end-to-end digital experiences speeding signature processes by 500% with legal, trusted

More information

High Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail

High Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail High Confidence Transportation Cyber-Physical Systems: Automotive, Aviation, and Rail November 20, 2008 Chris Greer Director, US National Coordination Office Networking and Information Technology Research

More information

The current status of Esi TC and the future of electronic signatures

The current status of Esi TC and the future of electronic signatures SG&A ETSI FUTURE WORKSHOP Sophia Antipolis, 16th January 2006 The current status of Esi TC and the future of electronic signatures Riccardo Genghini, Chairman of Etsi Esi TC riccardo.genghini@sng.it The

More information

Interagency Advisory Board Meeting Agenda, February 2, 2009

Interagency Advisory Board Meeting Agenda, February 2, 2009 Interagency Advisory Board Meeting Agenda, February 2, 2009 1. Opening Remarks (Tim Baldridge, NASA) 2. Mini Tutorial on NIST SP 800-116 AND PIV use in Physical Access Control Systems (Bill MacGregor,

More information

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop

Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop Next Generation Physical Access Control Systems A Smart Card Alliance Educational Institute Workshop PACS Integration into the Identity Infrastructure Salvatore D Agostino CEO, IDmachines LLC 8 th Annual

More information

The U.S. Manufacturing Extension Partnership - MEP

The U.S. Manufacturing Extension Partnership - MEP The U.S. Manufacturing Extension Partnership - MEP Roger D. Kilmer Director, MEP National Institute of Standards and Technology (NIST) U.S. Department of Commerce roger.kilmer@nist.gov 301-975-5020 http://www.nist.gov/mep/

More information

Federal PKI. Trust Store Management Guide

Federal PKI. Trust Store Management Guide Federal PKI Trust Store Management Guide V1.0 September 21, 2015 FINAL Disclaimer The Federal PKI Management Authority (FPKIMA) has designed and created the Trust Store Management Guide as an education

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

National Strategy for CBRNE Standards

National Strategy for CBRNE Standards National Strategy for CBRNE Standards Franca R. Jones Assistant Director Chemical and Biological Countermeasures National Security and International Affairs Office of Science and Technology Policy 11 September

More information

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights Secure Messaging Mobile App Privacy Policy Privacy Policy Highlights For ease of review, Everbridge provides these Privacy Policy highlights, which cover certain aspects of our Privacy Policy. Please review

More information

Delivering Certificates or Trust Building Robust PKIs Alan T Liddle Msc BSc PgDip FBCS CEng CITP AMP MIMMM

Delivering Certificates or Trust Building Robust PKIs Alan T Liddle Msc BSc PgDip FBCS CEng CITP AMP MIMMM Delivering Certificates or Trust Building Robust PKIs Alan T Liddle Msc BSc PgDip FBCS CEng CITP AMP MIMMM Trustis Limited Building 273 Greenham Business Park RG19 6HN Agenda Introduction PKI Standards

More information

eidas Regulation eid and assurance levels Outcome of eias study

eidas Regulation eid and assurance levels Outcome of eias study eidas Regulation eid and assurance levels Outcome of eias study Dr. Marijke De Soete Security4Biz (Belgium) ETSI eidas Workshop 24 June 2015 Sophia Antipolis eidas Regulation Regulation on electronic identification

More information

European Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission

European Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission European Framework for C-ITS Security 6 th of March 2018 Gerhard Menzel European Commission Key EU Policy Milestones to deliver C-ITS in Europe by 2019 Cooperative Intelligent Transport Systems A European

More information

Managed Access Gateway Third-Party Credential User Guide August 2017

Managed Access Gateway Third-Party Credential User Guide August 2017 Managed Access Gateway Third-Party Credential User Guide August 2017 Copyright 2017 Exostar, LLC All rights reserved 1 Contents Audience... 3 How to Register for a New MAG Account with your Third-Party

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

LEGISLATION UPDATE Updates on EU Data Protection Regulation, Patient Privacy and Consent 10 Things Every Bio/Pharma Need to Know Now

LEGISLATION UPDATE Updates on EU Data Protection Regulation, Patient Privacy and Consent 10 Things Every Bio/Pharma Need to Know Now LEGISLATION UPDATE Updates on EU Data Protection Regulation, Patient Privacy and Consent 10 Things Every Bio/Pharma Need to Know Now CBI Global Life Science Compliance Meeting November 16, 2016 Contents

More information

Digital Solutions. January, 2016

Digital Solutions. January, 2016 Digital Solutions January, 2016 This document provides an outline of a presentation and is incomplete without the accompanying oral commentary and discussion. Conclusions and/ or potential strategies contained

More information

FPKIPA CPWG Antecedent, In-Person Task Group

FPKIPA CPWG Antecedent, In-Person Task Group FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent

More information

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY

NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Standardization of Entity Authentication Assurance 5th ETSI Security Workshop 20-2222 January 2010 ETSI, Sophia Antipolis, France Erika McCallister, Esq.,

More information

Partner Information Manager Supplier Guide October 2017

Partner Information Manager Supplier Guide October 2017 Partner Information Manager Supplier Guide October 2017 Copyright 2017 Exostar, LLC All rights reserved. Contents Exostar s Partner Information Manager (PIM)... 2 Cybersecurity Questionnaire... 2 NIST

More information

Government support for Industry Consortia and why it matters. IIS/O5 hosted by DIACC, Ottawa November 2, 2016

Government support for Industry Consortia and why it matters. IIS/O5 hosted by DIACC, Ottawa November 2, 2016 Government support for Industry Consortia and why it matters IIS/O5 hosted by DIACC, Ottawa November 2, 2016 Setting the scene Canada has competitive advantage in digital identity (but let s not talk about

More information

Requiring Digital Signatures and Certificates

Requiring Digital Signatures and Certificates DocuSign Quick Start Guide Requiring Digital Signatures and Certificates Overview If you are doing business in an industry or region of the world that demands digital signatures, you can leverage DocuSign

More information

Certificate. Certificate number: Certified by EY CertifyPoint since: July 10, 2018

Certificate. Certificate number: Certified by EY CertifyPoint since: July 10, 2018 Certificate Certificate number: 2018-016 Certified by EY CertifyPoint since: July 10, 2018 Based on certification examination in conformity with defined requirements in ISO/IEC 17065:2012 and ETSI EN 319

More information

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008 Interagency Advisory Board HSPD-12 Insights: Past, Present and Future Carol Bales Office of Management and Budget December 2, 2008 Importance of Identity, Credential and Access Management within the Federal

More information

Scaling Interoperable Trust through a Trustmark Marketplace

Scaling Interoperable Trust through a Trustmark Marketplace Scaling Interoperable Trust through a Marketplace John Wandelt Georgia Tech Research Institute This work was performed under the following financial assistance award 70NANB13H189 from the U.S. Department

More information

EU General Data Protection Regulation (GDPR) Achieving compliance

EU General Data Protection Regulation (GDPR) Achieving compliance EU General Data Protection Regulation (GDPR) Achieving compliance GDPR enhancing data protection and privacy The new EU General Data Protection Regulation (GDPR) will apply across all EU member states,

More information

Federal Identity Credentialing: State of Play

Federal Identity Credentialing: State of Play Federal Identity Credentialing: State of Play Smart Card Alliance Annual Forum October 19, 2004 Judith Spencer U.S. General Services Administration judith.spencer@gsa.gov PMC E-Government Agenda Government

More information

1 Hitachi ID Access Certifier. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications

1 Hitachi ID Access Certifier. 2 Agenda. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications 1 Hitachi ID Access Certifier Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Periodic review and cleanup of security entitlements. 2 Agenda Hitachi ID corporate overview.

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

NIJ and Personnel Location Precision Indoor Personnel Location and Tracking for Emergency Responders Technology Workshop August 7 & 8, 2006

NIJ and Personnel Location Precision Indoor Personnel Location and Tracking for Emergency Responders Technology Workshop August 7 & 8, 2006 NIJ and Personnel Location Precision Indoor Personnel Location and Tracking for Emergency Responders Technology Workshop August 7 & 8, 2006 Joe Heaps Portfolio Manager, CommTech Office of Science and Technology

More information

Smart Cards & Credentialing in the Federal Government

Smart Cards & Credentialing in the Federal Government Smart Cards & Credentialing in the Federal Government Smart Card Alliance 13 Feb 2003 Salt Lake City Bill Holcombe GSA Office of Governmentwide Policy New Urgency for Credentialing Solutions Post 9/11

More information

AB1-3 Keeping People Safe and Secure in Federal Facilities

AB1-3 Keeping People Safe and Secure in Federal Facilities May 13-14, 2014 Walter E. Washington Convention Center Washington, DC AB1-3 Keeping People Safe and Secure in Federal Facilities Bernard Holt, Deputy Executive Director & Lindsey Blair, Senior Program

More information

QMS in the ISO World: ISO 9001 and ISO Certification and Accreditation. Quality Confab. 3 November, Dan Tholen, M.S.

QMS in the ISO World: ISO 9001 and ISO Certification and Accreditation. Quality Confab. 3 November, Dan Tholen, M.S. QMS in the ISO World: ISO 9001 and ISO 15189 - Certification and Accreditation Quality Confab 3 November, 2010 Dan Tholen, M.S. A2LA Presentation topics ISO 9001 vs 15189 In a nutshell Conformity Assessment

More information

IT Security Evaluation : Common Criteria

IT Security Evaluation : Common Criteria AfriNIC-9 MEETING Mauritius 22-28 November 2008 IT Security Evaluation : Common Criteria Ministry of Communication Technologies National Digital Certification Agency Mounir Ferjani November 2008 afrinic

More information

CertiPath TrustVisitor and TrustManager. The need for visitor management in FICAM Compliant PACS

CertiPath TrustVisitor and TrustManager. The need for visitor management in FICAM Compliant PACS CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant PACS CertiPath TrustMonitor CertiPath TrustVisitor and TrustManager The need for visitor management in FICAM Compliant

More information

A Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances

A Quick Guide to EPCS. What You Need to Know to Implement Electronic Prescriptions for Controlled Substances A Quick Guide to EPCS What You Need to Know to Implement Electronic Prescriptions for Controlled Substances Many healthcare providers have delayed implementing electronic prescriptions for controlled substances

More information

Global cybersecurity and international standards

Global cybersecurity and international standards World Class Standards Global cybersecurity and international standards Professor Solange Ghernaouti-Hélie sgh@unil.ch Faculty of Business and Economics, University of Lausanne Member of the Hight Level

More information

Leveraging the LincPass in USDA

Leveraging the LincPass in USDA Leveraging the LincPass in USDA Two Factor Authentication, Digital Signature, Enterprise VPN, eauth Single Sign On February 2010 USDA Takes Advantage of the LincPass USDA is taking advantage of the LincPass

More information

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES

IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES IMPLEMENTING SECURITY, PRIVACY, AND FAIR DATA USE PRINCIPLES Introductions Agenda Overall data risk and benefit landscape / shifting risk and opportunity landscape and market expectations Looking at data

More information

The Software Assurance Ecosystem: OMG s Approach to Systems & Software Assurance

The Software Assurance Ecosystem: OMG s Approach to Systems & Software Assurance The Software Assurance Ecosystem: OMG s Approach to Systems & Software Assurance Dr. Richard Mark Soley Chairman and CEO Object Management Group, Inc. With thanks to the OMG Systems Assurance Domain Task

More information

CMS Contractor PIV Credentialing Focus & Role of EFI

CMS Contractor PIV Credentialing Focus & Role of EFI HSPD-12 IDENTITY & CREDENTIALING MANAGEMENT (ICM) COUNCIL HSPD-12 @ CMS Contractor PIV Credentialing Focus & Role of EFI CSCOUT - August 2018 8/1/18 18/1/18 Discussion Topics Why are we doing this? How

More information

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall

More information

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure

DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-

More information

DoD & FiXs : Identity Superiority

DoD & FiXs : Identity Superiority DoD & FiXs : Identity Superiority Implementing common authentication now & into the future. The Federation for Identity and Cross-Credentialing Systems (FiXs) www.fixs.org FiXs - The Federation for Identity

More information

Mobile Performance Support and Training within the U.S. Federal Government

Mobile Performance Support and Training within the U.S. Federal Government 606 Mobile Performance Support and Training within the U.S. Federal Government June 21 23, 2011 San Jose, CA John Low, Carney, Inc. D0D: 242+ Fed: 124+ Army: 232+ NASA 10+ SI 8+ NIH 42+ There are over

More information

Modernising the public sector through the cloud

Modernising the public sector through the cloud Modernising the public sector through the cloud Alison Gillwald (PhD) & Mpho Moyo Executive Director: Research ICT Africa RIA Associate Adjunct Professor: University of Cape Town RIA Workshop RANICTP2

More information

AlphaTrust PRONTO - Transaction Processing Overview

AlphaTrust PRONTO - Transaction Processing Overview AlphaTrust PRONTO - Transaction Processing Overview 1 / 16 Table of contents Transaction Processing Overview... 3 Product Overview... 4 Transaction Processing... 6 Commentary... 8 Document Format Requirements...

More information

locuz.com SOC Services

locuz.com SOC Services locuz.com SOC Services 1 Locuz IT Security Lifecycle services combine people, processes and technologies to provide secure access to business applications, over any network and from any device. Our security

More information

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 A Checklist for Compliance in the Cloud A Checklist for Compliance in the Cloud 1 With the industrialization of hacking and the enormous impact of security breaches,

More information

Trusted Identities That Drive Global Commerce

Trusted Identities That Drive Global Commerce Trusted Identities That Drive Global Commerce For information of the BCS/EEMA Community A truly Federated Trust Network - Building upon core competences of the worlds banks & payments systems Governance

More information

Last Updated 12/11/2015. LM Procure to Pay Quick Reference Guide For Suppliers Completing a Registration Request

Last Updated 12/11/2015. LM Procure to Pay Quick Reference Guide For Suppliers Completing a Registration Request Last Updated 12/11/2015 LM Procure to Pay Quick Reference Guide For Suppliers Completing a Registration Request Lockheed Martin Procure to Pay Revised December 2015 Procedure This quick reference guide

More information

Streamlined FISMA Compliance For Hosted Information Systems

Streamlined FISMA Compliance For Hosted Information Systems Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and

More information

AUDIT GUIDELINES FOR A GOV TSP TSP OF THE BASQUE ADMINISTRATION

AUDIT GUIDELINES FOR A GOV TSP TSP OF THE BASQUE ADMINISTRATION AUDIT GUIDELINES FOR A GOV TSP TSP OF THE BASQUE ADMINISTRATION IZENPE: A GOV TSP Created in 2003. Owners: Basque Government and Regional Governments of the Basque Country ISO 27001, ETSI TS 101 456 and

More information

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model

More information

How the SBIR/STTR Programs Help Grow Your Businesses

How the SBIR/STTR Programs Help Grow Your Businesses Click to edit Master title style How the SBIR/STTR Programs Help Grow Your Businesses 1 Click Jerry to Alfonso edit Master Miles, title Esq. style Experience Jerry Miles, a government contracts attorney

More information

Pharma IT ELECTRONIC RECORDS

Pharma IT ELECTRONIC RECORDS Pharma IT ELECTRONIC RECORDS Excerpted from Pharmaceutical Formulation & Quality (PFQ) magazine, February/March 2008 E-Signatures Set the Standard E-signatures can improve access to documents and information

More information