FedInsights by Okta, SailPoint, Radiant Logic and CyberArk

Fighting cyber threats with Identity Management

On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and rel...

Of the 97 “significant” global cyber incidents tallied by the Center for Strategic and International Studies through the end of November of this year, U.S. government agencies and defense and high tech companies were targeted 30 times. “Significant” means “losses of more than one million dollars.” According to the National Counterintelligence and Security Center, foreign intelligence entities, which may include foreign governments, corporations and their proxies, are actively targeting information, assets and technologies vital to both U.S. national security and global competitiveness at an unprecedented rate.

At the heart of U.S. government agencies’ missions is assurance that the right person is accessing the right information at the right time – for the right reason. Identity Management is the key. It’s the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities. On the “Innovation in Government Cyber Leaders” show, the creation and use of policies, standards, implementation and architecture to support robust and reliable Identity Management was the focus of our discussion.

Shape

Operational challenges

The new thing that’s evolving for us, as we move to artificial intelligence, is how do we authenticate bots and make sure that bots that are coming in are actually supposed to be there and are authorized to do what they are trying to do?”

Shape

Identity management enables access

At the end of the day, the US attorneys have to litigate. They have to be successful in the litigation and they have to put bad people in jail in. Everything that we do is really directed towards enabling that. If that’s access to resources more efficiently, more effectively, then that's what we're trying to do with our access management platforms.

Shape

The role of identity in “Zero Trust”

The network perimeter is not as we once knew it and the identity’s become that new perimeter. So as we see this shift and we see the paradigm shift of security, we need to manage the identity and manage the entitlements.

Listen to the full show:

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

Related Stories

Panel of experts

  • Zachary Brown

    CISO, Federal Deposit Insurance Corporation

  • Greg Hall

    Assistant Director, Information System Security & Chief Information Security Officer, Executive Office for U.S. Attorneys, Department of Justice

  • Patricia Janssen

    Director, Cybersecurity Architecture & Capability Oversight, Office of the Deputy CIO for Cybersecurity, Department of Defense

  • Jaime Lynn Noble

    CISO, Office of Justice Programs, Department of Justice

  • Adam Zeimet

    Chief, Identity, Credential, & Access Management, Department of Agriculture

  • Bill Baz

    DoD Account Executive, Radiant Logic

  • Kevin Jermyn

    Regional Manager, Federal Customer Success, CyberArk

  • Habib Hourani

    Solutions Engineer, Okta

  • Frank Briguglio

    Public Sector Identity Governance Strategist, SailPoint

  • JJ Green

    National Security Correspondent, WTOP