Restricting access based on role is the task of authorization. Authentication and authorization have become trickier activities because of cloud computing and mobile computing.
In thisexclusive executive briefing, the following civilian agency technologists discuss how identity and authorization require more agile and adaptable approaches:
Beau Houser, Chief Information Security Officer, Small Business Administration
Yves Massard, Product Marketing Director, HID Global
Thomas McCarty, Director, Enterprise IT Service Division, Information Sharing and Services Office, OCIO, Department of Homeland Security
Andrew Sheedy, ID Assurance Solutions Architect, Sales, HID Global
Rod Turk, Acting Chief Information Officer and Chief Information Security Officer, Department of Commerce
Craig Wilson, Chief Information Security Officer, Federal Emergency Management Agency
By providing your contact information to us, you agree: (i) to receive promotional and/or news alerts via email from Federal News Network and our third party partners, (ii) that we may share your information with our third party partners who provide products and services that may be of interest to you and (iii) that you are not located within the European Economic Area.