Navy Contributions to Identity Management
|
|
- Abigayle Austin
- 8 years ago
- Views:
Transcription
1 Navy Contributions to Identity Management CAPT John M. Boyd Director, Dept of the Navy Identity Management Capability Biometric Consortium Conference 22 September 2009 UNCLASSIFIED
2 Applications UNCLASSIFIED Scope: Identity Management (IdM) Universe Information- Sharing Federated Services Digital ID Friendly UNK/Neutral Adversary 2
3 Biometrics Enterprise DoN Perspective BTF- West 3
4 Focused Applications Robust biometrics collection and matching in austere environments Provides a rugged/portable device which locally collects and matches biometric data to enroll, identify, and verify the identity of personnel Based on fully validated requirements Strict adherence to standards Fingerprint, iris, face image collection Ability to transfer data via external comms to reach back for remote matching Document/media collection & linkage 4
5 IDT COTS UNCLASSIFIED Identity Dominance System (IDS) Device Capability Progression TBCMS Based on Draft IDS CDD SIIMON/ SIIMON Block II IDS CDD KPP/KSA Functionality IDS PIV1 CDD/CPD Expanded Maritime Interception Operations (EMIO) Identity Dominance Toolset (IDT) Rapid Deployment Capability (RDC) 2007 Tactical Biometric Collection and Matching System Personnel Identification Version 1 Capability Development Document 2012 IDT RDC-Navy $ TBCMS RDDC-Army $ SIIMON-Army $ SIIMON Block II-USMC $ IDS POR-Navy $ 5 5
6 Focused Applications (cont) Physical access controls Working with Services, JS J8, USNORTHCOM to develop a Joint Identity-Enabled Physical Access Control (JIPAC) capability Leverage mature projects/technologies Concentrating on: Authentication/Verification of identity Characterization for fitness Authorization Consider legal/policy restrictions as we develop the capability to characterize individuals seeking access to military installations 6
7 JIPAC Simulation 7
8 Endeavors Large Scale Architecture Cross-organizational Information Sharing Vigorously employ model-based systems engineering as part of our due diligence Functions Operational Tasks & Activities System Components 8
9 What to Avoid Networks to Nowhere 9
10 The Three Most Important Points 1. There are TWO lines of advance within the USG on Identity Management: Screening Access Controls Harmonizing/Integrating these is essential to progress 2. Strong IdM does NOT necessarily mean weak Privacy! Entails strong cybersecurity measures. 3. Needed governance must embrace the whole community/process, at every level Emergence of these processes is the next big step in federal IdM 10
11 Where we need help 1. Standard algorithms: Biometric template generation Matching Improves interoperability while reducing long-term costs 2. Back Office efficiencies Communications Analysis of information & intelligence production Warfighter requires accurate & complete intel reports in time to make a decision otherwise, don t bother. 3. Policy/legal guidance for biometric collections and characterization of individuals Require expanded policy to collect in maritime domain; Need expanded guidelines for friendly force biometrics collection ISO physical access controls; Extending to Logical access & Business functions 11
12 Dept of the Navy POCs CAPT John Boyd Director, Dept of the Navy Identity Management Capability 703) Ms. Erin Castleman IdM Analyst, contractor support 703)
13 OPNAV POCs LCDR John Lenox OPNAV N867 - Afloat AT/FP, Biometrics john.lenox@navy.mil (703) Mr. Nick Hall OPNAV N867 - Contractor Support kevin.n.hall.ctr@navy.mil (703)
14 Backup Ready, Fire, Aim 14
15 Policy & Training/Education Policy WG addressed Privacy Act and IdMrelated issues wrt access controls and military operations Training and Education Established IdM certificate/master s level education program at Naval Postgraduate School in Monterey, CA DoD Executive Agent (Army) is sponsor Participation across DoD Three classes completed 15
16 Scale Treaty Orgs UN Industry Others International US Govt/Interagency DoD/Joint DoN 16
17 Summary 1. DoN is supplying invaluable Identity Management thought leadership Across Policy, Training & Education, and Technology 2. Driving solutions in partnership with DoD elements Solutions applicable to Navy Dept and across DoD and interagency partners 3. Biometrically-enabled capabilities apply to broad domains Military operations, Physical access controls; Extending to Logical access & Business functions 17
The State of DoD Biometrics
The State of DoD Biometrics Biometrics Consortium Conference 22 Sep 2010 Mr Tom Dee Director, Defense Biometrics Director, JRAC OSD (AT&L), DDR&E thomas.dee@osd.mil 1 Agenda What We ve Done Biometrics
More informationOperational and Policy Considerations. Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA
Identity Management: Operational and Policy Considerations Glenn R. Cook Department of Information Sciences Naval Postgraduate School Monterey, CA IdM Operations and Policy Who Are You? Identifying Friend
More informationHSPD-12 Implementation Architecture Working Group Concept Overview. Version 1.0 March 17, 2006
HSPD-12 Implementation Architecture Working Group Concept Overview Version 1.0 March 17, 2006 Table of Contents 1 PIV Lifecycle... 3 2 High Level Component Interaction Diagram... 4 3 PIV Infrastructure
More informationCYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
More informationPractical Challenges in Adopting PIV/PIV-I
UNCLASSIFIED Practical Challenges in Adopting PIV/PIV-I Hank Morris UNCLASSIFIED 2 UNCLASSIFIED // FOUO Purpose and Agenda Purpose: Explore the policy, process, and mechanisms to securely leverage biometrics
More informationLife After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May 2009. By Lynne Prince Defense Manpower Data Center
Life After PIV Authentication In Federated Spaces Presented to Card Tech/Secure Tech By Lynne Prince Defense Manpower Data Center Interoperability with HSPD12 Capability PIV provides a secure common credential,
More informationSPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement
SPAWAR HQ ARCHITECTURE AND HUMAN SYSTEMS GROUP Human-Systems Integration/Systems Engineering Support Performance Work Statement 1.0 INTRODUCTION The Department of the Navy Space and Naval Warfare Systems
More informationSmart Cards and Biometrics in Physical Access Control Systems
Smart Cards and Biometrics in Physical Access Control Systems Robert J. Merkert, Sr. Vice President of Sales Americas Biometric Consortium 2005 Conference September 21, 2005 All Company and/or product
More informationBiometric Performance Testing Methodology Standards. Michael Thieme, Vice President IBG, A Novetta Solutions Company
Biometric Performance Testing Methodology Standards Michael Thieme, Vice President IBG, A Novetta Solutions Company Overview Published standards In-development ISO/IEC standards Scope and status 2 Published
More informationFrequently Asked Questions (FAQs) SIPRNet Hardware Token
Air Force Public Key Infrastructure System Program Office (ESC/HNCDP) Phone: 210-925-2562 / DSN: 945-2562 Web: https://afpki.lackland.af.mil Frequently Asked Questions (FAQs) SIPRNet Hardware Token Updated:
More informationProduct Testing Programs
Catalog of USG Product Programs Version 1.0 November 15, 2010 NSTC Subcommittee on s and Identity Management 1. Introduction This Catalog of USG Product Programs (Catalog) supplements the Registry of USG,
More informationDeveloping a Federal Vision for Identity Management
Developing a Federal Vision for Identity Management Duane Blackburn Office of Science and Technology Policy Executive Office of the President January 16, 2009 Height DNA Biometric Name Date of Birth SSN
More informationJourney to Peak Performance. Mountain Point. NCTA Mobility Network Agile Methodologies
Journey to Peak Performance Mountain Point NCTA Mobility Network Agile Methodologies Background 2000: Inception U.S. Army Biometric Program 2003: Biometrics could be used to prevent the enemy in Iraq and
More informationPalmSecureID for the EDUCATION MARKETPLACE
PalmSecureID for the EDUCATION MARKETPLACE with Student Identity Integrity With the continued effort to increase efficiencies in the world of education, PalmSecureID can be utilized in a variety of settings
More informationIn search of safe harbor
Program Securing the nation s ports represents one of the most complicated undertakings in homeland because of the high volume of traffic and large number of parties involved. Timely, accurate data sharing
More informationCommon Criteria Evaluations for the Biometrics Industry
Common Criteria Evaluations for the Biometrics Industry Kathy Malnick Senior Manager Criterian Independent Labs An initiative of the WVHTC Foundation Presentation outline Common Criteria defined Common
More informationNavy Information Dominance Industry Day
Navy Information Dominance Industry Day Vice Admiral Kendall Card Deputy Chief of Naval Operations for Information Dominance and Director of Naval Intelligence OPNAV N2/N6 Evolution of Warfare 1990 Non-Kinetic
More informationForecast to Industry 2015 External Contracting Opportunities
Forecast to Industry 2015 External Contracting Opportunities Mr. Douglas W. Packard Director, Procurement Services Directorate 2 November 2015 UNCLASSIFIED 109 103 ENCORE III Navy Maintenance Database
More informationNAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN
NAVAL SEA SYSTEMS COMMAND STRATEGIC BUSINESS PLAN 2013-2018 2 NAVAL SEA SYSTEMS COMMAND Foreword Everything the United States Navy brings to the fight, and ultimately does for the nation, is delivered
More informationOptical Memory Cards in Federal Government
NIST Storage & Processor Card Workshop July 7 & 8, 2003, Gaithersburg, MD Optical Memory Cards in Federal Government Stephen Price-Francis Vice President, Business Development LaserCard Systems Corporation
More informationNaval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code (Revised: Fall AY14)
Naval Postgraduate School Department of Computer Science Graduation Checklist for MSCS Degree 6203P Subspecialty Code () Name/Rank/Service: Month/Year Enrolled: Projected Graduation Date: CS Track: 1.
More informationIssuance and use of PIV at FAA
Issuance and use of PIV at FAA Presented to: Government Smart Card Interagency Advisory Board By: Ed Ebright, Division Manager, ID Media Division Date: May 2011 Agenda What we use PIV Card Status FAA HSPD-12
More informationMs. Sandy Veautour Chief Systems Engineer PSG
Ms. Sandy Veautour Chief Systems Engineer PSG SBIR Initiatives Phase I FY 07 3 Awards High Speed Wireless 3-D Video Transmission to Support Virtual Dismounted Training 2 Phase I contract awards Battlefield
More informationSoftware Safety Strategy for US Navy Gun System Acquisition Programs
Software Safety Strategy for US Navy Gun System Acquisition Programs Joey Rivera, Paul Dailey Software Engineering Ph.D. Students, Naval Postgraduate School 1 Background US Navy weapon and combat system
More informationCyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
More informationAudio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
More informationGOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationThe Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
More informationNaval Education and Training (NETC) Distance Learning Perspective
Naval Education and Training (NETC) Distance Learning Perspective CAPT Kevin Oakes Director, Learning and ment Division (N7) Naval Education and Training Command (NETC) DL Management in the Navy Total
More informationSpace and Naval Warfare Systems Center Atlantic
Space and Naval Warfare Systems Center Atlantic Small Business and Industry Outreach Initiative (SBIOI) Twenty-Seventh Quarterly Symposium 31 January 2013 Mr. Charles Adams Transport & Computing Infrastructure
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400:,, Test & Evaluation, Defense-Wide / BA 3: Advanced Technology (ATD) COST ($ in Millions) Prior
More informationDRAFT Pan Canadian Identity Management Steering Committee March 1, 2010
DRAFT Pan Canadian Identity Management Steering Committee March 1, 2010 Pan Canadian Identity Management & Authentication Framework Page 1 1 Introduction This document is intended to describe the forming
More informationSoftware Engineering Program
Prof. Bret Michael, Academic Associate COMM (831) 656-2655, DSN 756-2655, bmichael@nps.edu CDR David Schiffman, Program Officer COMM (831) 656-7980, DSN 756-7980, dlschiff@nps.edu July 12, 2007 What is
More informationBiometric Enterprise Architecture
Prepared by: Team Biometric Enterprise Architecture (Team BM-EA) In partial fulfillment Of Requirements for SYS/OR 798 Fall 2009 Date: Revision History Date Purpose Revision Level Responsible Person October
More informationInformation Briefing and Reception. Chris Van Metre President, SCRA Applied R&D December 4, 2014
Information Briefing and Reception Chris Van Metre President, SCRA Applied R&D December 4, 2014 Overview OT Consortium Business Model Section 845 Other Transactions Agreement DoD Spectrum Enterprise (DSE)
More informationaddressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
More informationDEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 9410.5C N2/N6 OPNAV INSTRUCTION 9410.5C From: Chief of Naval Operations Subj: NAVY
More informationDistance Support Customer Relationship Management. ISEA RMC Collaboration Tool. User Manual
Distance Support Customer Relationship Management ISEA RMC Collaboration Tool User Manual September 19, 2012 Table of Contents Table of Contents... 2 Figures... 2 Points of Contact... 3 1 Overview... 4
More informationCyber Situational Awareness - Big Data Solution
Cyber Situational Awareness - Big Data Solution Dan Bart & Bob Landreth DISA ID61 17 Jun 2015 1 CSAAC / RDK Overview Cyber Situational Awareness Analytical Capabilities (CSAAC) is a set of NIPRNet and
More informationGovernment Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010
Government Smart Card Interagency Advisory Board Moving to SHA-2: Overview and Treasury Activities October 27, 2010 Interagency Advisory Board Meeting Agenda, October 27, 2010 1. Opening Remarks 2. A Discussion
More informationAn Operational Architecture for Federated Identity Management
An Operational Architecture for Federated Identity Management March 2011 Implementing federated identity management and assurance in operational scenarios Federated Identity Solution The Federated identity
More informationConsolidated Afloat Networks and Enterprise Services (CANES)
Consolidated Afloat Networks and Enterprise Services (CANES) Re-architecting the Navy s s C4I Network Infrastructure Lockheed Martin SNA Media Brief 11 January 2010 Lockheed Martin Proprietary Information
More informationFuture Force and First Responders: Building Ties for Collaboration and Leveraged R&D
Future Force and First Responders: Building Ties for Collaboration and Leveraged R&D Joachim Hammer 24 th Army Science Conference Orlando, FL November 30, 2004 Motivation Need for collaboration between
More informationDoD CIO ITSM Overview Enterprise Architecture Conference
DoD CIO ITSM Overview Enterprise Architecture Conference April 14, 2011 Barbara McCain Enterprise Architecture & Infrastructure DoD CIO Barbara.McCain@osd.mil What is IT Service Management (ITSM)? ITSM
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities With the explosion in personal mobility and growing migratory flows, governments
More informationEnd-to-end security with advanced biometrics technology
www.thalesgroup.com Identity Management End-to-end security with advanced biometrics technology Challenges and opportunities New environment With the explosion in personal mobility and growing migratory
More informationBig Data Systems and Interoperability
Big Data Systems and Interoperability Emerging Standards for Systems Engineering David Boyd VP, Data Solutions Email: dboyd@incadencecorp.com Topics Shameless plugs and denials What is Big Data and Why
More informationBFC Product Evaluation and Selection Process DoD Biometrics Fusion Center. Executive Officer
BFC Product Evaluation and Selection Process DoD Biometrics Fusion Center Executive Officer 1 Purpose of Briefing To present the selection and acquisition process for biometric devices at the BFC. 2 Briefing
More informationCLOUD COMPUTING SERVICES CATALOG
CLOUD COMPUTING SERVICES CATALOG... Including information about the FedRAMP SM authorized Unclassified Remote Hosted Desktop (URHD) Software as a Service solution CTC Cloud Computing Services Software
More informationPEO IWS Enterprise Product Lifecycle Management Integrated Data Environment (eplm IDE) Jolene Marshall Thomas Murphy
2011 Integrated Warfare Systems Conference PEO IWS Enterprise Product Lifecycle Management Integrated Data Environment (eplm IDE) Jolene Marshall Thomas Murphy eplm IDE Initiation Malcolm Baldrige Source:
More informationONR/PEO IWS/PEO C4I Combat System (CS)/Command and Control (C2) Limited Test Experiment (LTE) and Results: A SOA Success Story
ONR/PEO IWS/PEO C4I Combat System (CS)/Command and Control (C2) Limited Test Experiment (LTE) and Results: A SOA Success Story Matthew Fisher Progeny Systems March 31st, 2011 Part Number: P005578, Rev:
More informationIdentity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
More informationSubject: Department of the Navy Social Security Number (SSN) Reduction Plan Phase Three
DON CIO Message **************** UNCLASSIFIED / **************** Subject: Department of the Navy Social Security Number (SSN) Reduction Plan Phase Three Originator: COLUMBIA/L=WASHINGTON/OU=DON CIO (UC)
More informationCYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science
More informationEnterprise Services for Defense Transformation
Enterprise Services for Defense Transformation Prof. Paul A. Strassmann George Mason University, February 19, 2007 1 Case Study Hewlett-Packard Cost Reduction 2 Example of Application Simplification Domain
More informationSecurity and Privacy Challenges of Biometric Authentication for Online Transactions
Security and Privacy Challenges of Biometric Authentication for Online Transactions Elaine Newton, PhD NIST Information Technology Laboratory, Computer Security Division elaine.newton@nist.gov 1-301-975-2532
More informationDepartment of Defense SHA-256 Migration Overview
Department of Defense SHA-256 Migration Overview 18 March 2011 Tim Fong DoD-CIO/ IIA Timothy.Fong@osd.mil General Observations This is Important INFOSEC: Algorithms can be compromised over time. Crypto
More informationPublic Key Infrastructure
UT DALLAS Erik Jonsson School of Engineering & Computer Science Public Key Infrastructure Murat Kantarcioglu What is PKI How to ensure the authenticity of public keys How can Alice be sure that Bob s purported
More informationStatement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before
Statement of Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation Before THE UNITED STATES SENATE ARMED SERVICES COMMITTEE (SUBCOMMITTEE ON READINESS AND MANAGEMENT SUPPORT)
More informationPacific Warfighting Center
Pacific Warfighting Center Training and Exercises Directorate USPACOM J32 23 January 2015 1 Pacific Warfighting Center (PWC) on Ford Island Provide key enablers to develop and execute the USPACOM Joint
More informationRising to the Challenge
CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned
More informationSURVEILLANCE ENHANCED FACE RECOGNITION
SURVEILLANCE ENHANCED FACE RECOGNITION BIOMETRICS Face Recognition Biometrics technology has matured rapidly over recent years, and the use of it for security and authentication purposes has become increasingly
More informationEngineering Update November 2014
November 2014 PURPOSE AND AUDIENCE This document provides an update to Engineering: The First Steps published in July 2014. This document has the same audiences: Members: What is happening in the engineering-related
More informationDEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549. Joint Interoperability Test Command (JTE) 7 Jan 15
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 7 Jan 15 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
More informationNIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics
NIST s FIPS 201: Personal Identity Verification (PIV) of Federal Employees and Contractors Masaryk University in Brno Faculty of Informatics Jan Krhovják Outline Introduction and basics of PIV Minimum
More informationTechNet Land Forces South Small Business Opportunities. Carey Webster Director, Federal Information Solutions Deltek
TechNet Land Forces South Small Business Opportunities Carey Webster Director, Federal Information Solutions Deltek Agenda Review of Upcoming Opportunities for Small Businesses Army 8 Small Business Navy
More informationAF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration
Headquarters Air Combat Command AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration This Briefing is: UNCLASSIFIED Mr. John Vona, GS-15 AFC2IC/C2P Purpose Discuss
More informationDe Nieuwe Code voor Informatiebeveiliging
De Nieuwe Code voor Informatiebeveiliging Piet Donga, ING Voorzitter NEN NC 27 - IT Security 1 Agenda Standardisation of Information security The new Code of Practice for Information Security The Code
More informationMarine Corps. Commercial Mobile Device Strategy
Marine Corps Commercial Mobile Device Strategy April 2013 THIS PAGE INTENTIONALLY LEFT BLANK FOREWORD The currently constrained budget environment requires us to balance fiscal responsibility and mission
More informationMaster Data Management Architecture
Master Data Management Architecture Version Draft 1.0 TRIM file number - Short description Relevant to Authority Responsible officer Responsible office Date introduced April 2012 Date(s) modified Describes
More informationSTATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
More informationNOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
More informationDoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
More informationThe Government-wide Implementation of Biometrics for HSPD-12
The Government-wide Implementation of Biometrics for HSPD-12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy September 24, 2008 1 The HSPD-12 Mandate Home Security
More informationDoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
More informationStatus: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS
Status: Final Form Date: 30-SEP-13 Question 1: OPDIV Question 1 Answer: OS Question 2: PIA Unique Identifier (UID): Question 2 Answer: P-2277902-798208 Question 2A: Name: Question 2A Answer: Identity and
More informationUNCLASSIFIED. Rules of Behavior Department of State SharePoint System (DOSSS) Internet DMZ
Rules of Behavior Department of State SharePoint System (DOSSS) Internet DMZ Version 1.0 January 30, 2012 Prepared By: Systems & Integration Office (SIO) IRM/OPS/SIO/CCS Author: Distribution: Document
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationMICHAEL STEFANINI Current as of 7/2014
MICHAEL STEFANINI Current as of 7/2014 Home Address Work Address 24519 Thistle Ct. Jet Propulsion Laboratory Newhall, CA 91321 4800 Oak Grove Drive, MS 600-147 (661) 753-3442 Pasadena, CA 91109 email:
More informationDefense Healthcare Management Systems
Defense Healthcare Management Systems Recovering Warrior Task Force Interagency Program Office (IPO) Review Mr. Christopher Miller 28 January 2014 1 Agenda Topic Introduction Program Executive Office (PEO)
More informationDirector of Intelligence Proposed Research Topics
Director of Proposed Research Topics Suggested Graduate Program Thesis Topics Headquarters, U.S., 3000, Pentagon, Room 1A262B, Washington, DC 20350-3000 Sept 2011 DIRINT Suggested Graduate Program Thesis
More informationAir Force Agency for Modeling & Simulation Mission Brief. Col James Spanky Dennis AFAMS Commander
Air Force Agency for Modeling & Simulation Mission Brief Col James Spanky Dennis AFAMS Commander Organizational Structure Executive Services Mr. Bob Verica Financial Officer Mr. Joe Lawrence Commander
More informationTHE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
More informationWhat Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
More informationJoint Training Enterprise Architecture
Joint Training Enterprise Architecture WJTSC M&S WG 19 September 2012 Mandate for Change Reduce JLVC Operating & Sustainment Costs Keep pace with the operating environment Joint Force 2020 CE2T2 Program
More informationFrom Shelfware to Software:
From Shelfware to Software: Compliance Standards in the Era of Big Data 16 September 2014 SCARLETT WIRT Assistant Director Compliance Standards, Monitoring and Assessments National Security Agency 1 NSA
More informationFor Official Use Only (FOUO)
The FEMA Mission To support our citizens and first responders to ensure that as a nation we work together to build, sustain, and improve our capability to prepare for, protect against, respond to, and
More informationAudit of the Board s Information Security Program
Board of Governors of the Federal Reserve System Audit of the Board s Information Security Program Office of Inspector General November 2011 November 14, 2011 Board of Governors of the Federal Reserve
More informationDepartment of the Navy ebusiness Operations Office
ebus iness Innovation DON Card Management www.don-ebusiness.navsup.navy.mil Department of the Navy ebusiness Operations Office Presented by: Ms. Karen Meloy Deputy Commander, DON ebusiness Operations Office
More informationNEIS HELP DESK FAQS. HSPD-12 Policy/Business Process. General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.
General HSPD-12 FAQs can be found online at: http://lincpass.usda.gov/faq.html HSPD-12 Policy/Business Process 1. How long is the entire process for Non-Employees? After enrollment, applicants should receive
More information2. APPLICABILITY AND SCOPE
Department of Defense DIRECTIVE NUMBER 1000.25 July 19, 2004 Certified Current as of April 23, 2007 USD(P&R) SUBJECT: DoD Personnel Identity Protection (PIP) Program References: (a) DoD Directive 1000.22,
More informationCompliance and Security Challenges with Remote Administration
Sponsored by Netop Compliance and Security Challenges with Remote Administration A SANS Whitepaper January 2011 Written by Dave Shackleford Compliance Control Points Encryption Access Roles and Privileges
More informationENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
More informationThe Convergence of IT Security and Physical Access Control
The Convergence of IT Security and Physical Access Control Using a Single Credential to Secure Access to IT and Physical Resources Executive Summary Organizations are increasingly adopting a model in which
More informationPerspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory
Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Standardization and Cloud Computing Cloud computing is a convergence of many technologies Some
More informationEstimating Cloud Computing Costs: Practical Questions for Programs
Estimating Cloud Computing Costs: Practical Questions for Programs Kathryn Connor RAND Corporation June 2014 In 2010, the OMB proposed Federal Agencies consolidate data centers to save money. In 2013,
More informationEstimating Cloud Computing Costs: Practical Questions for Programs. Kathryn Connor
Estimating Cloud Computing Costs: Practical Questions for Programs Kathryn Connor RAND Corporation June 2014 In 2010, the OMB proposed Federal Agencies consolidate data centers to save money. In 2013,
More informationBiometrics for payments. The use of biometrics in banking
Biometrics for payments The use of biometrics in banking Biometrics for payments Biometrics for payments The use of biometrics in banking The use of biometrics for authentication is nothing new. But historically,
More informationNetwork Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
More information