Government Presents Federal Policy

Federal Policy, Technology Standards for Shaping Secure Identity and Access

The impact of updates to policy and specifications for the expanded use of standards-based technologies on securing identity and access in government was a leading theme throughout the two-day event.

More than 300 government policy leaders, security experts and technology providers gathered at the Secure Technology Alliance’s Securing Federal Identity 2018 conference in Washington, D.C., last week to discuss the latest developments and innovations in federal identity credentialing and access security.

As the nation’s premier event for government-led cybersecurity policy and digital identity technology, more than half of registrations were federal executives looking to learn about identity management roadmap changes, progress for cloud and mobility initiatives, and updates from OMB, GSA, DHS and NIST on policy and standards initiatives.

An Insider’s Look

The impact of updates to policy and specifications for the expanded use of standards-based technologies on securing identity and access in government was a leading theme throughout the two-day event.

Keynote speaker Suzette Kent, federal CIO of OMB, kicked off the event by highlighting some of the challenges that need to be addressed through advances in policy and technology, including gaps in the use of multi-factor authentication, the division between logical and physical access, and the need for cross-agency interoperability.

More government policy and technology updates followed Kent’s remarks from two federal program leaders – Jim Sheire, director of FICAM at GSA and Anil John, cyber security R&D program manager at DHS. Both provided valuable insights into progress the government is making in aligning identity policy and security standards with changing requirements for mobile authentication and modernizing identity management services.

Jordan Burris, senior cybersecurity advisor for the Executive Office of the President, shared an inside look at how and why the draft federal Identity Policy document OMB M-18-XX was developed, stating that industry feedback deemed the previously-published policies too restrictive, and confined innovation. Burris said this feedback helped to direct the latest update, with the goal to consolidate and update existing requirements and promote innovation by improving ICAM governance, modernizing ICAM capabilities and improving adoption of shared services.

Hildegard Ferraiolo, computer scientist at NIST, gave an update on derived mobile credentials detailed in NIST publication SP-800-157 and an early look into the updates being made to SP 800-116, “A Recommendation for the Use of PIV Credentials in PACS,” being released this summer. She highlighted that the aim of the revision is to align with HSPD-12 to ensure electronic authentication for PACS is reliable, fast, secure and interoperable across agencies.

Alternatives for Authentication

In a panel focused on multifactor authentication choices, three authentication experts outlined innovative alternatives and current initiatives for multi-factor authentication for federal agencies:

  • Paul Grassi, partner and SVP of cybersecurity and identity management at Easy Dynamic Corporation, pointed to FIDO authentication as a standards-based option that is being widely implemented across a variety of industries and platforms that provides high-assurance strong authentication. Grassi highlighted that FIDO authentication can be used in government to provide stronger, more usable and more affordable authentication than passwords and OTPs
  • Joel Minton, executive director of Login.gov, detailed how the Login.gov initiative is mandating strong authentication to make managing federal benefits, services and applications across multiple government agencies easier and more secure. Today, more than 20 agencies are offering services through Login.gov
  • Col. Tom Clancy, who serves as IDAM and PKI lead in the Office of the Secretary of Defense, looked at different authentication options, such as PKI, FIDO Security Keys and on-device credentials, and discussed the need for finding a way to simplify implementation of these options

Expanding the Use of PIV to Mobile Devices

In a discussion on federal identity programs and standards, speakers gave updates on use cases where progress is being made in expanding the use of PIV credentials to mobile devices.

David Coley, senior solution architect for Intercede, showed how mobile derived credentials based on PIV have become increasingly standardized across a wider range of mobile devices and mobile management services.

Ben Andreas, director of sales for XTec Inc., shared the latest developments in the rollout of derived credentials in DHS, more than 60,000 credentials have been issued. He also shared lessons learned surrounding testing, policy and the need for collaboration with people across a variety of roles within DHS to make the implementation successful.

Brandon Iske, Purebred lead at DISA, shared an update on their Purebred initiative, which aims to augment the CAC card by moving credentials to mobile devices. Today, they have enabled credentials across approximately 35,000 devices on the iOS, Android, Microsoft and Blackberry mobile operating systems and are continuing to see growth.

Securing Federal Identity – a Forum for Education and Action

An educational panel led by the Secure Technology Alliance Access Control Council featured government and industry experts discussing lessons learned from their involvement in deployments of PIV-enabled PACS. Panelists shared their expertise in implementing PACS for government from the Alliance’s recent six-part webinar series on the topic, “How to Plan, Procure and Deploy a PIV-Enabled Physical Access Control System.” Panelists included Tony Damalas, vice president of SigNet Technologies Convergint Federal Solutions; Michael Kelley, electronic security system technical specialist at Parsons; Stafford Mahfouz, manager of the government and DoD vertical at TYCO; and William Windsor, deputy director Enterprise Integration and Compliance Office at DHS.

In providing educational sessions on technologies and policies, the Securing Federal Identity event also saw strong participation from the audience, making it a forum for federal government and technology executives to openly discuss current challenges, identify possible solutions, and answer questions about procurement of technology, alignment with policy, use of standards and developments in for government identity management initiatives.

Featured

  • 2025 Security LeadHER Conference Program Announced

    ASIS International and the Security Industry Association (SIA) – the leading membership associations for the security industry – have announced details for the 2025 Security LeadHER conference, a special event dedicated to advancing, connecting and empowering women in the security profession. The third annual Security LeadHER conference will be held Monday, June 9 – Tuesday, June 10, 2025, at the Detroit Marriott Renaissance Center in Detroit, Michigan. This carefully crafted program represents a comprehensive professional development opportunity for women in security this year. To view the full lineup at this year’s event, please visit securityleadher.org. Read Now

    • Industry Events
  • Report: 82 Percent of Phishing Emails Used AI

    KnowBe4, the world-renowned cybersecurity platform that comprehensively addresses human risk management, today launched its Phishing Threat Trend Report, detailing key trends, new data, and threat intelligence insights surrounding phishing threats targeting organizations at the start of 2025. Read Now

  • NRF Supports Federal Bill to Thwart Retail Crime

    The National Retail Federation recently announced its support for the Combating Organized Retail Crime Act of 2025. The act was introduced by Chairman Chuck Grassley, R-Iowa, Senator Catherine Cortez Masto, D-Nev., and Representative Dave Joyce, R-Ohio. Read Now

  • ISC West 2025 Brings Almost 29,000 Industry Professionals to Las Vegas

    ISC West 2025, organized by RX and in collaboration with the Security Industry Association, concluded at the Venetian Expo in Las Vegas last week. The nation’s leading comprehensive and converged security event attracted nearly 29,000 industry professionals and left a lasting impression on the global security community. Over five action-packed days, ISC West welcomed more than 19,000 attendees and featured 750 exhibiting brands. Read Now

    • Industry Events
    • ISC West
  • Tradeshow Work Can Be Fun

    While at ISC West last week, I ran into numerous friends and associates all of which was a pleasant experience. The first question always seemed to be, “How many does this make for you?” Read Now

    • Industry Events
    • ISC West

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection.