Spring 2013 ICAM Day. Opening Remarks. Tackling Pressing Implementation Priorities. In the past year, the ICAMSC has tackled numerous challenges to help agencies comply with ICAM requirements and cybersecurity priorities. Work Item. Description. ICAM Value.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Spring 2013 ICAM Day
In the past year, the ICAMSC has tackled numerous challenges to help agencies comply with ICAM requirements and cybersecurity priorities.
The goal of the Program of Work Review is to facilitate frequent and consistent coordination across ICAMSC working group leadership and OMB to foster transparency in the direction of the ICAMSC and drive towards agreed upon work products.
Promote PIV use for strong authentication when accessing federally-controlled facilities and federal information systems
Address emerging challenges and technologies to enhance ICAM value (e.g., mobile devices, cloud computing) and measure government-wide implementation
Enable identity federation and attribute exchange capabilities to support mission collaboration and information sharing
Maintain the ICAM architecture and support government-wide implementation and performance