PS1-3 Who’s Coming In Your Back Door? Identify Trusted Resources and Manage Compliance

Nov 18, 2014

4:15 PM - 5:30 PM

Daniel W. Krantz

Managing Director and CEO

Real-Time Technology Group

This "Who's Coming In Your Back Door?" session will address the critical challenges of Identity Verification, Professional Certification Tracking, and Credential Management, which are critical elements in managing risk associated with sensitive facilities and critical infrastructure. To help attendees assure the safety and security of operations, the presentation will explore ways to accomplish what must be done to effectively manage these risks. These include how to identify trusted resources; document individuals' professional training and credentials; and, maintain proof of compliance with regulatory requirements and SOPs. Results: These comprehensive identity profiles maintained in trusted communities protect against the risk of non-compliance, and enhance regional safety and security.

This session will help attendees to better:

  1. Understand vulnerabilities associated with employees, contractors and vendors.
  2. Identify operational best practices for personnel risk mitigation.
  3. Utilize proven methodologies for secure collection, processing and management of sensitive Personally Identifiable Information (PII) and Sensitive Security Information (SSI).
  4. Engineer a framework for audited, need-to-know information sharing among key community partners.
  5. Define criteria for measurement of critical compliance requirements.

Session Learning Objectives:

  1. Understand vulnerabilities associated with employees, contractors and vendors.
  2. Identify operational best practices for personnel risk mitigation.
  3. Utilize proven methodologies for secure collection, processing and management of sensitive Personally Identifiable Information (PII) and Sensitive Security Information (SSI).