A.L.I. A.L.I. A.L.I. Conference A.L.I. Stay Informed!
Upcoming ConferencesRegister for ConferencesRave ReviewsAbout A.L.I.Event OpportunitiesOrder WorkbooksContact UsHome

Download Brochure
Register Now
Speakers and Key Highlights
Who Will Attend
Benefits of Attending
Raves
Pre-Conference Workshop
Agenda Day 1
Agenda Day 2
Venue and Lodging
Registration Fees
Exhibit-Sponsorship
Event Partners

Network With Us!
Facebook

 
Register Now
agenda - Day 1: Tuesday, September 14, 2010

8:00 a.m.
Registration & Continental Breakfast & Exhibits


8:30 a.m.
Chairpersons Address
Chairperson's Welcome & Opening Remarks

James D. McCartney, Identity Management and Privacy Consultant
DELOITTE & TOUCHE, LLP

  ^BACK TO TOP

8:45 a.m.
Icon
An In-Depth Look At Identity, Credential And Access Management (ICAM)): A Roadmap And Implementation Guidance For Success

The Federal Government has built government-wide infrastructure for common and secure identity, credential and access management (ICAM) through four principal components – the Federal Public Key Infrastructure (PKI), Homeland Security Presidential Directive 12 (HSPD 12), Open Identity for Open Government, and the Federal e-Authentication initiative. 

This session will examine each of these infrastructure components, how they are inter-related, and the status of deployment across government as well as other non-federal user communities.  Attendees will leave with a greater understanding of the U.S. Federal Government’s processes for Trusted Identity Federation and for certifying non-federal identity federation trust providers.  You’ll also learn about the U.S Federal Government’s trust model for federated identity and the requirements and testing for interoperability across organizations, systems and components. 

Don’t miss this opportunity for increased insight on the Federal Identity and Access Management Infrastructure, including:

  • The Federal ICAM components
  • The Federal Identity Trust model
  • The basis for interoperability
  • Interoperability and conformance testing for products, components, and systems

David Temoshok, Director, Federal Identity Management
Office of Governmentwide Policy
U.S. GENERAL SERVICES ADMINISTRATION

  ^BACK TO TOP

9:45 a.m.
Icon
Speed Networking

Become acquainted with your fellow attendees in this fun and fast-paced forum!

  ^BACK TO TOP
10:15 a.m.
Icon
Morning Networking Break & Exhibits

10:45 a.m.
Icon
Federating Identity In The U.S. Department Of Defense: How To Integrate Multiple Identity Management Efforts Into A Single System While Maintaining Security

As the Federal Government moves toward a more integrated approach to identity, harmonizing existing efforts with new directions offers significant challenges to Federal agencies. It isn't enough to just create new capabilities; efforts must be an answer to existing requirements within the organization and must be able to meet those needs sufficiently to gain the trust of the people in the Department.

The U.S. Department of Defense (DoD) has some of the most challenging environments to work in and any identity management solution must be able to function in those unique situations. Whether it’s operating at remote bases in Afghanistan, on a ship, or in an office, employees must be able to access their workspaces and computers. DoD also deals with a wide variety of people who do not receive credentials for the Department that must be accommodated. DoD is aggressively working to accommodate federated credentials, without sacrificing security.

In this session, you will learn:

  • What does Rapid Electronic Authentication really mean?
  • PIV-I:  Who should be doing it?
  • Attribute exchange - enabling trust through information
  • Integrating multiple efforts into a single approach
  • How to avoid breaking your systems

Irving R. (Bob) Gilson, Program Office Branch Chief
Personal Identity Protection Solutions (PIPS) Division
DEFENSE MANPOWER DATA CENTER

  ^BACK TO TOP

11:30 a.m.
Icon
Next Generation Identification: The Future Of National-Scale Multimodal Biometric Systems

Driven by advances in technology, customer requirements, and growing demand for Integrated Automated Fingerprint Identification System (IAFIS) services, the FBI has initiated the Next Generation Identification (NGI) program. The NGI system is being developed over a multi-year timeframe and will be an incremental replacement of the IAFIS that provides new functionality and improves upon existing capabilities. This technology upgrade will accommodate increased information processing and fuse together information sharing from local, state, federal, and international agencies. The NGI system will offer state-of-the-art biometric identification services and provide a flexible framework of core capabilities that will serve as a platform for multimodal functionality.

Don't miss the latest update on the FBI's Next Generation Identification program and considerations for your own identity management systems.

Robert Holman, Management & Program Analyst, NGI
FEDERAL BUREAU OF INVESTIGATION

  ^BACK TO TOP

12:15 p.m.
Lunch On Your Own -- But Not Alone!

Join a small group of your colleagues for lunch with an informal discussion facilitated by one of our expert speakers. Take this opportunity to join others in an interactive group setting to network and brainstorm solutions to your most pressing identity management concerns.

  ^BACK TO TOP

1:45 p.m.
Icon
Panel Discussion: An Inside Look At Establishing Interoperability Between Federal, State And Local Emergency Response Officials

The Command, Control and Interoperability (CCI) Division within the Science & Technology (S&T) Directorate, the FEMA Office of National Capital Region Coordination (NCRC), the FEMA Office of the Chief Security Officer (OCSO), and the FEMA Office of the Chief Information Officer (OCIO) have partnered to create the PIV-I/FRAC Technology Transition Working Group (TTWG). The TTWG is composed of State and Local government emergency management representatives, many of whom have already implemented innovative and secure identity-management solutions in their own jurisdictions. 

The goal of the working group is to:

  • Provide Federal policy makers with a unified State emergency manager
    perspective on Federal/Emergency Response Official (F/ERO) attributes
  • Baseline current identity infrastructure and best practices to share with stakeholders
  • Identify technological gaps where CCI can provide test bed research
    and development support
  • Share information: State-to-State, State-to-Federal, and Federal-to-State

The working group is focused on exploring PIV-I credentials as the standard that enables interoperability between local and State emergency response officials. PIV-I is a trusted identity and credentialing standard developed by the Federal Government for non-Federal issuers. Non-Federal entities that elect to conform to the PIV-I standard will be trusted by and interoperable with Federal agencies at assurance level 4. These authentication assurance levels are described fully by OMB M-04-04.

Through the efforts of the TTWG, your state and local emergency response partners will be equipped to provide seamless and secure interactions that ensure public safety.

Learn from the experiences of this innovative Federal, state and local government partnership how you can incorporate best practices to help transform your own identity management efforts.


Moderated By:
Craig Wilson, Sr. Consultant, NCRC
FEDERAL EMERGENCY MANAGEMENT AGENCY

Panelists:
Karyn Higa-Smith, Program Manager, Science & Technology (S&T) Directorate,
Command, Control and Interoperability (CCI) Division
U.S. DEPARTMENT OF HOMELAND SECURITY

Charles Luddeke, Chief of Physical Security, Office of the Chief Security Officer
FEDERAL EMERGENCY MANAGEMENT AGENCY

Elisa Cruz, Chief Information Security Officer, Office of the Chief Information Officer
FEDERAL EMERGENCY MANAGEMENT AGENCY

Mike McAllister, Deputy Assistant to the Governor for Commonwealth Preparedness
COMMONWEALTH OF VIRGINIA

Pamela Holstein-Wallace, West Virginia Region III Coordinator
STATE OF WEST VIRGINIA

  ^BACK TO TOP

2:45 p.m.
Icon
FIPS 201 Standards-Based Interoperable Credentialing
Of First Responders: Enhancing Cooperation And Efficiency Across Multiple Jurisdictions

The First Responder Authentication Credential (FRAC) is an interoperable standards-based (Federal Information Processing Standards 201 [FIPS 201]) identification smart card designed to provide federal, state, local and private sector emergency responders with the ability to quickly and easily gain access to an all-hazards event across multiple jurisdictions. The Virginia FRAC Program serves as a model for other regions to enhance cooperation and efficiency between emergency responders before and during a critical incident. It expedites response and recovery efforts by facilitating a more efficient verification of identity and attributes/skill sets and enhancing the protection of emergency responders and Critical Infrastructure / Key Resources (CI/KR) from unauthorized access during an event.

To date, the Commonwealth of Virginia has issued over 2,300 FRACs and participated in multiple “proof of implementation” and COOP/COG DHS multi-state exercises.  Through participation, the Commonwealth of Virginia has demonstrated that its FRACs are interoperable with other FIPS 201 compliant and interoperable federal, state and private industry credentials. In 2010, the Commonwealth will issue an additional 12,900 FRACs in the Hampton Roads and other regions.

This session will provide you with insight on the Commonwealth of Virginia's experience with the implementation of an interoperable FIPS 201 standards-based credentialing program, including:

  • An overview of the FIPS 201 interoperable credentialing standard
  • Enhanced capabilities provided by an interoperable and trusted credentialing program
  • Stakeholders (public and private sector)
  • Credentialing strategies
  • Funding


Mike McAllister, Deputy Assistant to the Governor for Commonwealth Preparedness
COMMONWEALTH OF VIRGINIA

  ^BACK TO TOP
3:30 p.m.
Icon
Afternoon Refreshment & Networking Break

3:45 p.m.
Icon
How To Leverage Public-Private Partnerships
In Security Management, Access Control And Credentialing

The U.S. Department of Homeland Security, Office of Infrastructure Protection implemented the Critical Infrastructure Key Resources (CIKR) Partnership Framework as the foundation for collaboration between Federal government and CIKR Private Sector Partners. Focusing on mutual interests that include national planning, protective measures and strategic response/recovery efforts, these coordinating council partnerships assist to shape the national security landscape.

State and local government organizations are now leveraging similar frameworks as models to engage private sector partners in identifying priorities that include incident management and processes for access control and credentialing.

This session will share the critical success factors of successful partnerships, including:

  • Identifying Key Partners
  • Cultivating the Purpose
  • Measurements for Success

You will leave this session equipped with new strategies to help you establish your own partnership model.

Renee Murphy, Section Chief, Partnership Programs, Partnerships and Outreach Division
Office of Infrastructure Protection
U.S. DEPARTMENT OF HOMELAND SECURITY

  ^BACK TO TOP

4:30 p.m.
Icon
The Transportation Worker Identification Credential (TWIC) Program: An Update On One Of The Largest Government-Sponsored Biometric Identity Programs

This presentation will provide you with an overview of the (TWIC) program that is jointly managed by the Transportation Security Administration (TSA) and the U.S. Coast Guard. TSA has enrolled 1.5 million civilian maritime workers in the TWIC program and has issued a smart card credential with biometric and other security features to each worker who passes a security threat assessment and background screening process. Possession of a TWIC card is required for unescorted access to restricted areas of maritime facilities and vessels regulated under the Maritime Transportation Security Act (MTSA).

Attendees will learn the background and legal authority for the TWIC program, its current status, and lessons learned in deploying the first massive government-led secure credentialing program to a civilian population. In particular, this session will share:

  • An overview of the TWIC program – including objectives, legislative authority and current operational status
  • The status of the field pilot test of TWIC reader products
  • A review of the technology behind TWIC and how it is aligned with HSPD-12 directive and FIPS 201 standards
  • The outlook for future rule making that will lead to regulatory requirements for the deployment of TWIC reader devices 

John Schwartz, Deputy Program Director – TWIC
TRANSPORTATION SECURITY ADMINISTRATION

Gerry Smith, Subject Matter Expert (SME) Support Contractor to TSA
IDENTIFICATION TECHNOLOGY PARTNERS

  ^BACK TO TOP

5:15 p.m.

End of Day One

  ^BACK TO TOP

5:30 p.m.
Icon
Networking Reception: Please Join Us!

We invite you to join us for a drink as you relax with your peers. All conference attendees, speakers and exhibitors are welcome to join us for this special opportunity to continue networking. Don't miss this chance to benchmark new ideas over complimentary drinks!


7:00 p.m.
Icon
Dine Around

Sign up during the day for dinner with a group. Take advantage of Washington, D.C.’s fine dining while you continue to network with your colleagues.

Speakers & Key HighlightsWho Will AttendBenefits of AttendingRave Reviews
Pre-Conference WorkshopsAgenda Day 1Agenda Day 2
Venue & LodgingRegistration FeesDiscounts & PoliciesConference Supporters
Register NowForward To A Colleague
Download Brochure
  ^BACK TO TOP

 

Upcoming ConferencesRegister for ConferencesRave Reviews About A.L.I.Event Opportunities
Order Workbooks Contact UsPrivacy PolicySitemapHome

©2002-2010 Advanced Learning Institute Inc. All Rights Reserved
8600 West Bryn Mawr Avenue, Suite 920-N, Chicago, IL 60631 • Phone: 773-695-9400 • Fax: 773-695-9403