2017 Agenda

Over 20 speakers will address efforts toward strong authentication technology in government identity programs, including Personal Identity Verification (PIV) credentials, developments in National Strategy for Trusted Identities in Cyberspace (NSTIC), trusted ID on the Internet and on mobile devices, developments in state and local ID, and evolving global standards.

08:00 AM

Breakfast in Pre-function Hall

 

 

Welcome Address and Agenda Review

 

Randy Vanderhoof, Secure Technology Alliance

 

Federal Secure Identity Policy and Technology Guidelines

 

  • Federal Government Security Priorities – Grant Schneider, Office of Management & Budget (invited)
  • Federal Identity and Access Security Policies Update – Joseph Stuntz, Office of Management & Budget (invited)
  • FICAM Implementation Strategy Update – Jim Sheire, GSA Office of Governmentwide Policy

 

Break

 

 

Federal Identity Programs and Standards

 

  • Implementing Changes to SP 800-63-3 – Paul Grassi, NIST Trusted Identity Group
  • What is Next for CAC? – Colonel Tom Clancy, Office of the CIO Identity Management Programs, U.S. Department of Defense
  • Federal Network Resilience – Using Metrix to Improve Cybersecurity Effectiveness – Michael Duffy, Federal Network Resilience Division. U.S. Department of Homeland Security

 

Lunch and Exhibitor Time

 

 

Mobile Identity and Authentication

 

  • Outlining DHS S&T’s Research and Development Goals for Mobile Authentication & Entitlement – Anil John, Department of Homeland Security
  • Physical Access Control Using Derived Credentials Over NFC – John Fessler, Exponent & Kantara Initiative
  • Mobile Authentication Interoperability Using FIDO for Digital Certificates – Michael Queralt, Queralt, Inc.
  • Context-Aware Security Technology for Responsive and Adaptive Protection (CASTRA) – Devu Manikantan Shila, United Technologies Research Corporation

 

Break

 

 

Using Secure Credentials for Authentication and Access Security

 

Moderator: Jeff Nigriny, CertiPath

  • What is Next for Derived Credentials on Mobile Devices? – Hildegard Ferraiolo, NIST
  • Using CDM to Identity Gaps in Physical Access Control Systems – Mark Steffler, Quantum Secure/HID Global
  • The Cloud: A Better Way to Implement Strong Multi-Factor Authentication with FIPS-Compliant Credentials – Bassam Al-Khalidi, Axiad IDS

 

Federal Identity and Security Call To Action Roundtable

 

The role that industry can serve to accelerate adoption of interoperable solutions for federal identity management and access security

Moderator: Randy Vanderhoof, Secure Technology Alliance

Speakers:

  • Tim Baldridge, DOD
  • LaChelle LeVan, GSA/FICAM
  • Michael Garcia, NIST Trusted Identity Group

 

Networking Reception

 

 

Conference Adjourns