Attend this conference to learn how to develop an effective identity management strategy and roadmap -- from policy to implementation -- along with helpful solutions, tools, tips and guidance to get started, including: |
|
Join your colleagues for this must-attend industry summit featuring best-practice examples and case studies from government experts who have successfully developed identity management systems and solutions, including: |
- Understanding the key technologies – how they work, costs and benefits, strengths and weaknesses – through various identity credential case study examples
- Overcoming the common obstacles of deploying the various credentials: Personal Identity Verification (PIV), Personal Identity Verification – Interoperable (PIV-I), Personal Identity Verification – Compatible (PIV-C), Transportation Worker Identification Credential (TWIC), Common Access Card (CAC), First Responder Authentication Credential (FRAC), etc.
- Achieving interoperability at the user level
- Planning for implementation and getting buy-in across the organization
- Using identity credentials for more than just flash passes - - to maximize investments in identity programs
- Implementing identity credentials for federal, state and local government employees and contractors
- Demonstrating the ROI of standardized identity management credentials
- Executing Identity, Credential, and Access Management (ICAM) – an identity and access management solution in your agency
- Transforming identity and access management into a more centralized activity to ensure security
- Considerations for PIV in a physical access control system
- Incorporating Public Key Infrastructure (PKI) to build trust in a federated system of identity
- Establishing policies, procedures and technology to support HSPD-12
- Credentialing not just individuals, but entire responder units
- Practical uses in the first responder world – going beyond implementation for just non-emergency events
- Differentiating between PIV, PIV-I, PIV-C
- Deploying identity management credentials on a shoestring budget
- Building the business case for the construction of unified and standardized identity management infrastructures
- Integrating and developing compliant credentialing systems for large and small populations
- Achieving compliance with Federal laws, regulations, standards and governance related to ICAM
- Reducing costs and increasing efficiency with ICAM to yield big payoffs
- Developing performance goals for identity systems
- Incorporating biometric information into your identity management system
- Partnering with other government and non-government agencies and organizations to determine standards and enable interoperability
- Understanding and using identity management standards to ensure interoperability and trust
|
|
U.S. General Services Administration
National Aeronautics and Space Administration
U.S. Department of Education
Transportation Security Administration
Defense Manpower Data Center
Federal Emergency Management Agency
Commonwealth of Virginia
Deloitte & Touche, LLP
Federal Bureau of Investigation
U.S. Department of Homeland Security
International Biometric Group
Pentagon Force Protection Agency
State of West Virginia
Daon
CertiPath LLC
American Trucking Associations
ActivIdentity
Microsoft
Adobe Systems Incorporated
Verizon
Supporting Organizations:
|