Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Cybersecurity

Data Breaches Shine Light on Identity Authentication Solutions for Government Agencies

by GTI Editors
August 13, 2015
in Cybersecurity
Reading Time: 2 mins read
A A
Share on FacebookShare on Twitter

In the midst of this year’s series of data breaches, government IT leaders are exploring their options in identity management and authentication to combat identity theft and insider threats.

Federal officials gathered during the 2015 Government Symposium to discuss the future of identity authentication, debating different forms of verification and when it’s appropriate to be cautious.

Michael Garcia, of the National Institute of Standards and Technology, said strong authentication simply depends on the situation.

“It’s about figuring out when the risk profile matches the strength of authentication,” he said,. “I think one of the biggest things we need to avoid is tricking ourselves into thinking we always need strong authentication. I mean there are times a bad password is ok – if it’s an unimportant application the consumer wants to use a password – have fun. If it’s an application that’s high risk, individuals need the option to do something stronger.”

Deb Gallagher, special advisor for defense manpower at the Department of Defense echoed Garcia’s stance.  To that end, she advocated for the use of public key infrastructure (PKI) and smart cards within federal agencies, but cautioned that finger prints and iris scans have not been embraced.

Also on the panel was Paul Hunter, deputy chief, Biometrics Division, DHS U.S. Citizenship and Immigration Services.  He shared that his agency is beginning to implement identity authentication solutions in the citizenship application process – not only to secure identity but make the process less burdensome on immigrants.  Hunter, originally from England, said he could personally attest to the trials and tribulations of the paperwork.

“It’s a lot of time for me, as an immigrant, to go to the Senate, take time off work,” Hunter said. “What we are starting to think about now, in terms of immigration, instead of being form-based, is to start to think about the person. Talk about the person – not the form.”

As the panel concluded, the resonating message was clear: identity theft cannot be obliterated – however, with proper practices and authentication, it can be managed.

Tags: IAMIdentity AuthenticationIdentity ManagementIdentity theftInsider ThreatMichael GarciaNISTOPM breach

RELATED POSTS

Four Smart Strategies to Combat the Log4j Security Vulnerability
Cybersecurity

Four Smart Strategies to Combat the Log4j Security Vulnerability

June 6, 2022
Arizona Department of Economic Security Combats Unemployment Benefits Fraud
Civilian

Arizona Department of Economic Security Combats Unemployment Benefits Fraud

April 21, 2022
Alerts
Civilian

Identify, Protect, Detect, Respond, and Recover: How Alerts Empower Agencies in a Tough Cybersecurity Environment

February 17, 2022
Please login to join discussion

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5356 shares
    Share 2142 Tweet 1339
  • For the Army to Reach Modernization Goals, a Tactical Data Fabric is Crucial

    40 shares
    Share 16 Tweet 10
  • Design Secure Application Software That Transforms Government Agencies

    11 shares
    Share 4 Tweet 3
  • 2022 Government Investigations Technology Guide Discusses Nine Factors Investigators Should Consider in Technology Solutions

    12 shares
    Share 5 Tweet 3
  • Customer and Industry Partnerships Are Helping Deliver 5G Solutions to Federal Agencies

    102 shares
    Share 41 Tweet 26

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Digital Transformation
    • Cybersecurity
    • Hybrid Work
  • Contact Us