Stop Issuing Secure Credentials to Impostors: A case for the Identity, Credential, and Access Management Construct
Webinar: Friday, October 16th, Noon-1 p.m. Eastern
It is difficult to screen individuals for possible imposter fraud or security concerns based upon the use of current identity documents, such as birth certificates, driver's licenses, or passports. These typically lack standardization of security features and vary significantly in layout. Even a trained examiner may struggle to recognize valid documents.
The webinar looks at the value of machine screening of identity documents and how this can be an improvement over human screening. Mitigating threats from insiders who have fraudulently gained employment is vital to protecting our nation's critical infrastructure. The Identity, Credentialing, and Access Management (ICAM) construct architecture provides organizations with a consistent approach for managing the vetting and credentialing of individuals requiring access to sensitive information systems and facilities.
The 60-minute webinar concludes with a moderated live question and answer period.
The session is offered as a complimentary, informational service of Capitol Technology University.
About the Presenter
Adjunct Professor Critical Infrastructure, Industrial Control System Security, and Access and Identity Management
Through his consultancy, Ron has business relationships with a diverse mix of businesses. He served as a board of directors for-profit and non-profit organizations. Ron retired from the United States (U. S.) Army in 1999 and the U. S. Government in 2011. In between his tours of Federal Service, he served five years as a civilian police officer in the Commonwealth of Virginia. During his Federal Service, he served with the U. S. Department of Health and Human Services as the program director for the development and implementation of the department’s Identity, Credentialing and Access Management (ICAM) Program.