Conference Tackles Identity, Cybersecurity Programs In Next Administration

U.S. federal government identity and smart card programs have grown significantly under the Bush administration. But with the election a week away, one important question on people's minds is, what will happen under the next administration?

This was a common theme for presenters as the Smart Card Alliance held its three-day, 7th annual government conference and hosted a meeting of the federal government's Interagency Advisory Board.

Smart cards, biometrics and identity spending got a boost from two wars and programs to improve homeland security, according to Jeremy Grant, identity solution analyst for Stanford Group, an investment banking and advisory company. Grant estimates federal spending on major U.S. identity solution programs grew 58.6 percent in 2007 to $1.6 billion, and by another 47.5 percent this year. He projects spending growth will flatten in 2009, growing by 3.1 percent.

Looking ahead to the new administration of either candidate, Grant expects good support for homeland security programs like U.S. VISIT, TWIC and electronic passport.

"Identity programs have not been particularly partisan," he said.

Grant is particularly bullish on the outlook for biometrics for defense and intelligence identity applications, which have proven themselves as valuable warfighting tools against the asymmetric threat facing America today. Special Forces in Iraq are capturing fingerprints for detainees, and finding 29 percent of them are getting a match in DoD databases, allowing them to identify and remove about two people a day who are known to be involved in Improvised Explosive Device (IED) activity against U.S. troops.

"Denying the enemy anonymity has proven it can help win wars," Grant said.

Still, with the economy, an expensive bailout and promises for more healthcare coverage on the table, figuring out identity strategy is likely to be low on the list of priorities for either new president, according to Grant.

Identity is so critical to so many missions of the Department of Homeland Security they have created an organization dedicated to it. Kathleen Kraninger, director of the Office of Screening Coordination, explained that their role is "to examine how we look at identity for the long term across all of our programs" and to try to rationalize what until now has tended to be separate systems and applications.

Looking more broadly at information security, there has been an awakening in recent years to its importance and the fact that the threat has escalated from individual hackers to organized crime to the nation/state level, according to Paul Kurtz, an advisor on cyber security to both the Clinton and Bush administrations and who is currently chief operating officer of Good Harbor Consulting and an on-air consultant to CBS News.

The Bush administration's Comprehensive National Cybersecurity Initiative (CNCI) identified key issues, including a very low level of situational awareness, and cybersecurity has been put up as a key transition issue. Kurtz predicts that the pendulum will swing and government will start to do more about information security, including work on supply chain security management, more effective attack analysis and seeing how HSPD-12 can be pushed out beyond government.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.