2019 Agenda Columns
Securing Federal Identity
Tuesday, June 4th
8:45am – 7:00pm
7:30 – 8:45
REGISTRATION
Coffee and pastries
8:45 – 9:00
Welcome and Agenda Review
Randy Vanderhoof, Executive Director, Secure Technology Alliance
9:00 – 9:30
Keynote Speaker
Securing Critical Infrastructure and the Federal Government – What Problem is Government Trying to Solve?
The speaker will be presenting how the use of federal enterprise-wide digital identity credentials enables government to achieve its mission to secure critical infrastructure and serve government agencies, workers, and citizens.
9:30 – 10:00
Keynote Speaker
How Are Governments Consuming Digital Identities?
The speaker to describe the use for the many different government digital identities which enable secure access to government operated or controlled services, such as military bases, ports and airports, REAL-ID compliant drivers licenses, electronic healthcare benefits.
10:00 – 10:30
Keynote Speaker
The Search for Trust in a Haystack of Digital Authenticators
The speaker will explain what authenticators are being used and what new authenticators are being considered for securing federal identity and how they align with SP800-63-3.
10:30 – 11:00
BREAK
11:00 – 12:15
Panel Session
What Happens When Identity Credentials Are No Longer Safe and Protected?
This panel session will discuss the effects of when individual credentials are stolen
- What Are the Protections Available?
- What Data is Stolen, Where is it Used?
- What is a Multiplying Effect on Risk for Cloud Migration?
- Does Everything Belong in the Cloud?
12:15 – 1:30
LUNCH and EXHIBITOR TIME
1:30 – 2:00
Featured Speaker
New Approaches for Authentication – How SAML, OpenID Connect, FIDO-enabled Devices Align with SP 800-63
The session will consider these open-sourced or commercial authentication methods for government use
2:00 – 3:15
Featured Roundtable #1:
Can Federation of Identity Be Achieved for Government Use?
This moderated roundtable session will look at the prospect of federation of government and non-government identity credentials and authentication choices across government domains that may be aligned with SP800-63-3
3:15 – 3:45
BREAK
3:45 – 4:15
Featured Speaker #2
A View of the Identity Applications for Mobile Drivers Licenses and REAL ID
- AAMVA
4:15 – 5:30
4 speakers, 15 min ea., plus 15 min Q&A
5:30 – 7:00
Networking Reception
Securing Federal Identity
Wednesday, June 5th
8:30am – 12:00pm
7:30 – 8:30
REGISTRATION
Coffee and pastries
8:30 – 9:00
Day 2 Keynote Speaker
Top Fed Administration Official – ie Fed CIO (Suzette Kent level)
9:00 – 10:15
Day 2 Panel Government Leadership Report
NIST – FIPS 201 -3 revisions- Hildy Ferraiolo
GSA / FICAM Report – Jim Sheire
OMB Federal Identity and Security Policy – cyber scoring, FISMA metrics for measuring – Jordan Burris
GSA/FAS Schedule 70/84 Changes – Kevin Mitchell, GSA
10:15 – 10:45
BREAK
10:45 – 12:00
Day 2 Roundtable: Future of Mobile Identity in Government (Tom Lockwood to moderate)
A mix of short presentations and discussion on mobile identity, including fed derived ?? credentials,; MDL, FIDO, NIST, Project Verify
Walter Beisheim, Nok Nok Labs (Project Verify)
NIST, FIDO
HID, Gemalto, IDEMIA, Exponent
12:00
CONFERENCE CONCLUDES (No lunch served)
Mobile Identity Workshop
Wednesday, June 5th
1:00pm – 5:00pm
(After the conclusion of Securing Federal identity 2019 Conference - requires separate registration)
Mobile devices are increasingly the primary device that employees, customers and citizens are using to authenticate their identity when accessing online services from companies and governments and to pay for products both online and in store. While providing a rich and secure platform for storing identity credentials and using them for authentication for these services, implementation approaches vary across industry sectors on how identity credentials are provisioned and used and what technologies are used to store and present the credential. This workshop will include presentations by experts and panels on two mobile identity credential initiatives – mobile driver’s licenses and the Federal government’s mobile “derived” credentials – and explore how they can be used in various use cases. The workshop will also look at current commercial standards and practices for using mobile identity credentials for online authentication.
1:00 – 1:15
Welcome and Introduction
Randy Vanderhoof, Executive Director, Secure Technology Alliance
1:15 – 2:15
Mobile Driver’s Licenses
Mobile driver’s licenses have the potential to revolutionize identity authentication processes in a wide variety of use cases. This session will provide an in-depth look at the status of mobile driver’s license standards, security frameworks, and the emerging processes for identity proofing, provisioning, and digital presentation for authentication. Panelists will offer an exploration of how mobile driver’s licenses can be used to provide identity authentication for various use cases — law enforcement, proof of identity, age verification, and access to government facilities.
- Presentation: Mobile Driver’s License Overview
- Panel: Use Cases for the Mobile Driver’s License
2:15 – 3:15
Derived Credentials in Mobile Identity
This session will discuss how derived credentials can be used with mobile devices to provide secure, easy-to-use identity authentication within the Federal government.
- Presentation: Derived Credentials Overview: What They Are and How They’re Used
- Panel: Use Cases for Derived Credentials
3:15 – 3:45
BREAK
3:45 – 4:45
Using Mobile Identities for Online Authentication: Current Standards and Practices
This session will discuss the current standards and best practices for online mobile identity authentication in the commercial environment, including the role of biometrics in mobile authentication.
- Presentation: Current Standards for Online Authentication using Mobile Devices (FIDO, W3C, NIST)
- Panel: Making Sense of the Standards
4:45 – 5:00
Wrap-up and Conclusion