Rebooting Identity and Access Management: Why Government Needs More Strong Authentication

Wednesday, May 20, 2015
02:00 PM EDT
Duration: 1 hour

According to the White House, the majority of government cyber incidents in FY13 could have been prevented by two-factor, or strong authentication. Yet as of this past February, just 41% of civilian agencies had implemented it - even worse, numerous agencies had made no progress whatsoever. Without a comprehensive authentication system across enterprises, the government will be unable to implement the kind of real-time, technical attribution analysis that is necessary for effective deterrence. How can agencies provide stronger user authentication for employees without hindering business as usual? With a decade in the books and little to show for it, what does the future hold for the Federal Information Security Management Act, and how will it affect identity and access management across government?

In this webcast, innovators in identity and access management will discuss:
  • The extent of the authentication challenge facing defense and civilian agencies
  • The three-pronged approach to identifying cyber attack perpetrators
  • Specifically, how defense and civilian agencies can improve their technical approach

Paul Grassi
Senior Standards and Technology Advisor
National Institute of Standards and Technology

Jennifer A. Kerber (Tentative)

Deb Gallagher
Defense Manpower Data Center Special Advisor
Department of Defense

Underwritten by:

 If you have previously registered for this event, please login below:

First Name*
Last Name*
Address 1*
Address 2
Work Phone:*
Job Sector*
If other:
Job Function*
If other:
You must have Javascript and Cookies enabled to access this webcast. Click here for Help.
Please enable Cookies in your browser before registering for the webcast.
*Denotes required.
Access to all Webinars is available to registered participants at no cost. In order to provide you with this free service, does share your registration information with sponsors of our Webinars. When you register for a Webinar, your information may be shared with the sponsor(s) of that event.

For questions regarding our events policies, please contact