Identity Management Symposium

Similar documents
5 th Annual Identity Management Symposium

5 th Annual Identity Management Symposium

4th Annual. Multi-INT Exploitation Summit

4th Annual. Multi-INT Exploitation Summit

13 th DoD/VA and Government HIT Summit*

6 th Annual U.S. Border Security and Intelligence Summit

Defense Strategies Institute cordially invites you to an educational and training Summit:

14 th DoD/VA and Government HIT Summit*

12 th DoD/VA and Government HIT Summit*

6 th Annual U.S. Border Security and Intelligence Summit

2016 Global Identity Summit Pre-Conference Paper Biometric Interoperability 2021

bordersecuritysummit.dsigroup.org

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Welcome to the Second Annual Intelligence & National Security Forum

Cyber Security Summit 2014 USCENTCOM Cybersecurity Cooperation

2016 SPONSORSHIP OPPORTUNITIES

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

COUNTERING IMPROVISED EXPLOSIVE DEVICES

CyberUSA Government Cyber Opportunities for your Region: The Federal Agenda - Federal, Grants & Resources Available to Support Community Cyber

Leading the Digital Transformation from the Centre of Government

NCCoE TRUSTED CLOUD: A SECURE SOLUTION

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

National Strategy for CBRNE Standards

PKI and FICAM Overview and Outlook

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

The National Biometrics Challenge 2011 Update

Identity Innovation: Requirements for Advanced Recognition, Processing, and Analytics for Government and Law Enforcement Applications

Department of Homeland Security Science & Technology

DoD Strategy for Cyber Resilient Weapon Systems

TEL2813/IS2621 Security Management

COUNTERING IMPROVISED EXPLOSIVE DEVICES

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.

CYBER SOLUTIONS & THREAT INTELLIGENCE

Cyber Security in Timothy Brown Dell Fellow and CTO Dell Security

Build Your Cybersecurity Team: Create a Strong Cybersecurity Workforce Using Best Practices in Development

Biometrics 101. Presented by The International Biometrics & Identification Association (IBIA)

INFORMATION ASSURANCE DIRECTORATE

The NIST Cybersecurity Framework

Cryptologic and Cyber Systems Division

Cybersecurity & Privacy Enhancements

Security and Privacy Governance Program Guidelines

SPONSORSHIP OPPORTUNITIES JULY 25-26, 2018 SANTIAGO, CHILE #ISC2CONGRESSLATAM LATAMCONGRESS.ISC2.ORG

How to Plan, Procure & Deploy a PIV-Enabled PACS

Cyber Security Program

4A Healthcare Data Security & Privacy

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

National Cyber Security and Cyber Terrorism Summit

National Cybersecurity Center of Excellence (NCCoE) Mobile Application Single Sign

Defense Engineering Excellence

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

THE ADVANCE OF BIOMETRICS IN GOVERNMENT FIVE WAYS UNISYS IS SUPPORTING BIOMETRIC EXCELLENCE IN GOVERNMENT AGENCIES WORLDWIDE

Interagency Advisory Board HSPD-12 Insights: Past, Present and Future. Carol Bales Office of Management and Budget December 2, 2008

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30

Testimony. Christopher Krebs Director Cybersecurity and Infrastructure Security Agency U.S. Department of Homeland Security FOR A HEARING ON

Government IT Modernization and the Adoption of Hybrid Cloud

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

Data to Decisions Terminate, Tolerate, Transfer, or Treat

December 5-6,

U.S. Customs and Border Protection Cybersecurity Strategy

Your Challenge. Our Priority.

Incident response to a breach: Right of boom you find ashes

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

The Office of Infrastructure Protection

INFORMATION ASSURANCE DIRECTORATE

Air Entry/Exit Re-engineering (AEER)

Federal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011

Published Privacy Impact Assessments on the Web. ACTION: Notice of Publication of Privacy Impact Assessments (PIA).

DHS Cybersecurity: Services for State and Local Officials. February 2017

Executive Order on Coordinating National Resilience to Electromagnetic Pulses

Evolving the Security Strategy for Growth. Eric Schlesinger Global Director and CISO Polaris Alpha

Solutions Technology, Inc. (STI) Corporate Capability Brief

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

ENTERPRISE ARCHITECTURE

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

Good morning, Chairman Harman, Ranking Member Reichert, and Members of

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

Cybersecurity for State and Local Law Enforcement: A Roadmap to Enhance Capabilities

Cybersecurity: Federalism as Defense-in-Depth

Government Contracting. Tech-Savvy World. in a. October InterContinental Miami. Miami, Florida

Security Survey Executive Summary October 2008

SPONSORSHIP PROSPECTUS CONNECT WITH YOUR TARGET AUDIENCE

Supplemental Programmatic Environmental Assessment (SPEA) for the Proposed

Cyber Resilience. Think18. Felicity March IBM Corporation

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

Strategies for the Implementation of PIV I Secure Identity Credentials

Electronic Warfare: Innovation & Evolution in Global Electromagnetic Operations

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

IoT & SCADA Cyber Security Services

National Cybersecurity Center of Excellence

National Information Assurance Partnership (NIAP) 2017 Report. PPs Completed in CY2017

Systems Engineering for Software Assurance

Securing the Internet of Things (IoT) at the U.S. Department of Veterans Affairs

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Security Program Design:

FiXs - Federated and Secure Identity Management in Operation

Cyber Attacks & Breaches It s not if, it s When

January 23-25, 2012 Washington, DC

Transcription:

Defense Strategies Institute Professional Educational Forum: Identity Management Symposium Advancing Biometric and Identity Activity Solutions April 18-19, 2017: Mary M. Gates Learning Center Alexandria, VA

Program Design & Goal: To more accurately identify threats that pose risks to vital U.S. Interests, the U.S. Government is actively seeking improvements to their biometric, identity and access management capabilities in order to provide greater insight on the behavior, intent and actions of known and unknown threat actors. As the need to secure valuable information online grows exponentially, the U.S. Government and DoD will continue to implement greater identity management strategies and adopt biometric technologies that promote greater online security. The 2017 Identity Management Symposium will provide valuable information on the current and prospective initiatives that the U.S. Government supports in order to integrate advanced identity and access management practices for greater defense and security. The Symposium will also provide updates on the biometric initiatives and technologies that improve the efficiency and security of Government Organizations. DSI s team specializes in the extensive research and development of our Symposium's content and focus areas, and we will assemble the most respected minds in the community from operational leaders, the R&D Community, key policy-makers, as well as solution providers from Industry and Academia. Our non-partisan approach allows us to reach across all involved organizations bring together a truly holistic group of decision makers and solution providers. Operating Guidelines: DSI s Symposium directly supports DoD, DHS, and Government priorities by providing a conduit for officials to efficiently reach audiences outside of their respective offices that directly impact their department's mission success, at no charge to the government, and in an efficient expenditure of time. DSI s Symposium will provide a forum to address and improve internal and external initiatives, meet with and hear from partner organizations, disseminate vital capability requirements to industry, increase visibility within the larger community, and generally support their mission. * The Symposium is open and complimentary to all DoD and Federal employees and is considered an educational and training forum. * (Industry and academia members are charged a fee of attendance) Symposium is CLOSED TO PRESS / NO RECORDINGS General Target Audience: Identity Management, Biometrics, Access Management, Identity Activity, Cyber Security, Forensics, Identity Intelligence, Digital Forensics Specific topics to be discussed include: - Next-Generation Access Management and Credentialing Initiatives - Current and future Mobile Biometric Capabilities and Standards - Multi-Modal Authentication Initiatives and Updates - Identity Intelligence Information Exchange and Sharing Initiatives - Standardizing Online Identity Practices to Increase Verification and Security - Biometric Technology R&D Requirements and Focus Areas - Big Data Solutions to Bolster Identification Information Collection - Advancements to Biometric Search Capabilities - Cyber Security Considerations and Initiatives - Recognition Technology Strategies post US-VISIT/IDENT - Biometric Investment Priorities; Future Trends and Industry s Role - Digital Forensics Initiatives - Improvements to Biometric Matching and Reporting - Facilitating Best Biometric Practices for Greater Border Protection - RDT&E for Future Biometric Modalities

Topics & Speaker Times Subject to Edits April 18, 2017 8:00-8:45 Registration and Light Breakfast Reception Open 8:45-9:00 Moderator Opening Remarks Benji Hutchinson (Confirmed) Senior Director, Washington, D.C. Operations NEC Corporation of America 9:00-9:50 Providing Timely Criminal Justice Information to Reduce Terrorist and Criminal Activity - Strategies to enhance information sharing capabilities with relevant mission partners - Cyber security considerations for information sharing - R&D efforts supporting greater interoperability for advanced information sharing James Loudermilk (Confirmed) Senior Level Technologist, CJIS FBI Marie E. Bernoi (Confirmed) Unit Chief, Identity Intelligence Unit Terrorist Screening Center, FBI 9:50-10:30 Enabling Identity Dominance on the Battlefield and Across the DoD - Updates on the BAT-A & DoD ABIS Programs and their future considerations - Strategies and initiatives to enhance data sharing capabilities with mission partners - Future acquisition priorities that support interoperable capabilities - Opportunities for industry COL Donald Hurst, USA (Confirmed) PM, DoD Biometrics PEO IEW&S 10:30-11:00 Networking Break 11:00-11:40 Advancing Identity Operations at the DoD for Enhanced National Security - Developing I2 capabilities to enhance intelligence analysis activities for JFCs and CCDRs support - Initiatives supporting greater forensic and biometric capabilities for DoD operations and activities - Identifying opportunities to enhance physical access control for DoD functions COL Dan McElroy, USA (Confirmed) Acting Director Defense Forensics and Biometrics Agency 11:40-12:20 Future Biometric & Identity Management Considerations at OBIM - Developing futures identity strategies - Considerations on future identity systems technology - Opportunities for industry John Boyd (Confirmed) Assistant Director, Futures Identity, OBIM DHS 12:20-1:00 Networking Lunch

1:00-1:40 Strengthening Identity Management Practices for Greater Access Management at the DoD - Updates on Cybersecurity Discipline Implementation Plan and its effect on current authentication capabilities - Developing a single identity standard to increase interoperability capabilities with mission partners and allies - Opportunities for industry: solutions for mobile capabilities and disconnected end users - Defining privileged access management frameworks Col Tom Clancy (Confirmed) Director, Identity Management Programs DoD 1:40-2:10 Identity and Account Protection - Establishing Identity as an important foundation to Cybersecurity - Enabling Multi Factor Authentication for higher security on legacy applications - Identity & Attribute Federation for finer grained authentication/authorization Joel Rader (Confirmed) Senior Solutions Architect Radiant Logic, Inc. 2:10-2:50 Department of Homeland Security, Biometric Policy and Strategy Considerations for the Future - Leveraging advanced credentialing methods for enhanced security capabilities - Current status of the DHS Biometric Framework 2015-2025 - DHS policy considerations for creating a DHS integrated biometrics enterprise Steve Yonkers (Confirmed) Director of Identity and Credentialing Screening Coordination Office, Office of Policy, DHS 2:50-3:10 Networking Break 3:10-3:50 Developing Digital Identity Security Capabilities for Individuals and Organizations at NIST - Updates on NSTIC program; the way ahead - Initiatives supporting advanced authentication measures for enhanced user privacy - Strategies to establish frameworks that enable objective measurement of identity solutions - Efforts to standardize identity practices Paul Grassi, CISSP (Confirmed) Senior Standards and Technology Advisor, NSTIC U.S. Department of Commerce, NIST 3:50-4:30 Leveraging Biometrics and Identity Management Strategies to Enforce Privacy Protections and Transparency for DHS Activities - Privacy compliance and information governance initiatives for DHS s biometric enterprise - Opportunities to leverage identity management capabilities for enhanced access control - Mission partner strategies for sharing and disseminating information Laurence Castelli (Confirmed) Senior Advisor to the Chief Privacy Officer Privacy Office, DHS

4:30-5:10 Identity Science and Technology Initiatives at CERDEC - Initiatives that promote enhanced search capabilities - Automated object recognition capability developments - Updates on requirements needed and where industry can assist Buane Delaine (Confirmed) Chief, Identity Intelligence Branch (I2WD) CERDEC April 19, 2017 8:15-8:45 Registration and Light Breakfast Reception Open 8:45-9:00 Moderator Opening Remarks Benji Hutchinson (Confirmed) Senior Director, Washington, D.C. Operations NEC Corporation of America 9:00-9:40 Transforming Air Force Cybersecurity through Innovative Policy and Technologies - Leveraging advanced information security technologies to enhance the protection of critical Warfighter/Business information - Defending Air Force Networks through implementation of advanced defense tools - Risk management strategies that protect Airmen and USAF Core Missions Frank Konieczny, SES (Confirmed) Chief Technology Officer USAF 9:40-10:20 Enhancing Physical and Logical Access Control Measures to Advance DoD Security - Initiatives supporting greater physical access control - Strategies to enhance logical access control validation - Update on identification and authentication programs - Considerations on future logical access control strategies Michael Sorrento, SES (Confirmed) Director Defense Manpower Data Center 10:20-11:00 *Keynote Remarks* Mitigating Cyber Risk through Enhanced Access Management Practices - Increasing network visibility to maintain access and control of networks - Opportunities to leverage advanced access management practices for greater cyber security - Collaboration strategies with mission partners that enable informed decision making processes Grant Schneider (Confirmed) Deputy Federal CISO Office of Management and Budget 11:00-11:30 Networking Break

11:30-12:10 Managing the Risk of Privileged Account & Privileged Passwords - Defend the targeted static privileged accounts by vaulting and keeping them moving - Rapidly PIV or CAC enable access to elevated privileges with full audit trail to meet compliance requirements and provide useful security data - Mitigate Pass-the-Hash vulnerability by removing access to passwords for privileged accounts - Reduce the need for large numbers of privileged accounts and provide the nonrepudiation link with PIV and CAC checkout Dan Conrad (Confirmed) Federal CTO One Identity, a Quest Software business 12:10-12:50 Leveraging Biometric Technologies and Strategies for Greater Homeland Defense 12:50-1:30 - Strategies to incorporate multi-modal biometric identity services - Considerations on future biometric strategies at USCIS - Initiatives supporting expansion of identity verification processes - Updates on future biometric technologies; what industry needs to know Lee Bowes (Confirmed) Chief, Biometrics Division USCIS Networking Lunch 1:30-2:10 Supporting Federal Government Cybersecurity Initiatives through Trusted Access Management - Updates on the FICAM Program; successes and next steps - Current access management initiatives and strategies that support Federal Cybersecurity efforts - GSA updates on ICAMSC and FPKI Tom Hallewell (Confirmed) FICAM Evangelist Identity Assurance and Trusted Access Division GSA Nandini Diamond (Confirmed) Deputy to the Director of Testing and Procurement Identity Assurance and Trusted Access Division GSA 2:10-2:50 Safeguarding America s Borders through Advanced Biometric Entry/Exit Systems - Updates on deployment of Entry/Exit Programs and lessons learned - Strategies to integrate mobile capabilities for CBP transformation - Initiatives to close biographic gaps for improved reporting and matching Colleen Manaher (Invited) Planning, Program Analysis & Evaluation Executive Director U.S. CBP

2:50-3:30 Face Recognition: Versatility, Accuracy, Evolution - Updates on current facial recognition capabilities - Considerations on future modality use - Mobile facial recognition considerations Patrick Grother (Confirmed) Computer Scientist NIST 3:30-3:40 Networking Break 3:40-4:20 Digital Forensics for Homeland Security - Face in video evaluation - Child exploitation, human trafficking, war criminals, gangs, etc. - Face, text, SMT, sensor pattern noise Patricia Wolfhope (Confirmed) PM, First Responders Group DHS 4:20-5:00 Biometric Technology Innovations and Research Initiatives at the CyLab Biometrics Center - Continuous authentication systems that leverage multi-modal identification capabilities - Access management initiatives that incorporate greater online security - Considerations on the use of biometrics identification on robots and UACVs - Facial recognition initiatives and advancements Marios Savvides (Confirmed) Director, CyLab Carnegie Mellon University 5:00 End of Symposium Topics & Speaker Times Subject to Edits LEAD DIAMOND SPONSOR: PLATINUM SPONSORS:

GOLD SPONSORS: MEDIA PARTNERS: