North Dakota reported smooth a telework transition, recommending compliance standardization and reliance on aggressive IAM protocols with MFA and zero trust perquisites.
Nebraska’s CIO Ed Toner leverages his teaming approach for cybersecurity, compliance, risk and identity and access management (IAM) in the era of coronavirus.
With this ever burgeoning regulatory environment, achieving and maintaining cybersecurity compliance is a complex process.
In this exclusive executive briefing, IT security professionals address the federal approach to identity management and zero trust.
Concepts like zero trust shifts the operating model and security beyond the perimeter and must be central to the ICAM discussion.
Agencies are becoming more interested in moving to a zero trust approach to cybersecurity so the CIO Council is working on an effort to define what that means for government.
This program will provide a progress report on identity and access management in government.
The Pentagon is still searching for a replacement for the Common Access Card. One solution under active consideration: measuring the way you walk, via your smartphone.
Radiant Logic’s differentiator is a three-letter phrase called “federated identity service.” This gives system administrators the flexibility to handle identity management quickly and safely.
Identity management is rising to the top of the list for many federal information technology professionals. Federal News Radio recently sat down with SailPoint Chief Technology Officer Darran Rolls to address the challenges federal technology leaders face today.