2017 Agenda

Over 20 speakers will address efforts toward strong authentication technology in government identity programs, including Personal Identity Verification (PIV) credentials, developments in National Strategy for Trusted Identities in Cyberspace (NSTIC), trusted ID on the Internet and on mobile devices, developments in state and local ID, and evolving global standards.

08:00 AM

Breakfast in Pre-function Hall



Welcome Address and Agenda Review


Randy Vanderhoof, Secure Technology Alliance


Federal Secure Identity Policy and Technology Guidelines


  • Federal Government Security Priorities – Grant Schneider, Office of Management & Budget (invited)
  • Federal Identity and Access Security Policies Update – Joseph Stuntz, Office of Management & Budget (invited)
  • FICAM Implementation Strategy Update – Jim Sheire, GSA Office of Governmentwide Policy





Federal Identity Programs and Standards


  • Implementing Changes to SP 800-63-3 – Paul Grassi, NIST Trusted Identity Group
  • What is Next for CAC? – Colonel Tom Clancy, Office of the CIO Identity Management Programs, U.S. Department of Defense
  • Federal Network Resilience – Using Metrix to Improve Cybersecurity Effectiveness – Michael Duffy, Federal Network Resilience Division. U.S. Department of Homeland Security


Lunch and Exhibitor Time



Mobile Identity and Authentication


  • Outlining DHS S&T’s Research and Development Goals for Mobile Authentication & Entitlement – Anil John, Department of Homeland Security
  • Physical Access Control Using Derived Credentials Over NFC – John Fessler, Exponent & Kantara Initiative
  • Mobile Authentication Interoperability Using FIDO for Digital Certificates – Michael Queralt, Queralt, Inc.
  • Context-Aware Security Technology for Responsive and Adaptive Protection (CASTRA) – Devu Manikantan Shila, United Technologies Research Corporation





Using Secure Credentials for Authentication and Access Security


Moderator: Jeff Nigriny, CertiPath

  • What is Next for Derived Credentials on Mobile Devices? – Hildegard Ferraiolo, NIST
  • Using CDM to Identity Gaps in Physical Access Control Systems – Mark Steffler, Quantum Secure/HID Global
  • The Cloud: A Better Way to Implement Strong Multi-Factor Authentication with FIPS-Compliant Credentials – Bassam Al-Khalidi, Axiad IDS


Federal Identity and Security Call To Action Roundtable


The role that industry can serve to accelerate adoption of interoperable solutions for federal identity management and access security

Moderator: Randy Vanderhoof, Secure Technology Alliance


  • Tim Baldridge, DOD
  • LaChelle LeVan, GSA/FICAM
  • Michael Garcia, NIST Trusted Identity Group


Networking Reception



Conference Adjourns