Higher Education’s Role in the Identity Ecosystem

Slides:



Advertisements
Similar presentations
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Advertisements

TFTM TFTM Committee working call to discuss how to describe the “IDESG-Acknowledged Identity Ecosystem” in its interim or long term state October.
Online Government June/2002 Public FTAA.ecom/inf/141/Add.3 June 4, 2002 Original: Spanish Translation: FTAA Secretariat.
TFTM Interim Trust Mark/Listing Approach Paper Discussion Deck TFTM Committee IDESG Plenary Meeting January 14, IDESG TFTM Committee1.
Identity Federation Rules and Process Linda Elliott President, PingID Network Electronic Authentication Partnership Washington, DC February 12, 2004.
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant Senior Executive.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
OpenStand and Collaborative Communities For innovation, solutions and market growth Kantara Initiative 3 June 2014 Summit Karen McCabe Senior Director,
Helena Sims NACHA – The Electronic Payments Association Overview of The Electronic Authentication Partnership Tenth Federal & Higher Education PKI Coordination.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
1. Guiding Principles 3. Critical Success Factors 2. Delivery Processes 4. Benefits Realisation Strategy Business Management Technology Management Roadmap.
1 National Strategy for Trusted Identities in Cyberspace National Strategy for Trusted Identities in Cyberspace Jeremy Grant NIST.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Emergence of Identity Management: A Federal Perspective Dr. Peter Alterman Chair, Federal PKI Policy Authority.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
Framework for Improving Critical Infrastructure Cybersecurity Overview and Status Executive Order “Improving Critical Infrastructure Cybersecurity”
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Federated Identity Management in New Zealand Sat Mandri Service Manager TNC15 REFEDs Meeting, 14 th June 2015.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
NSTC Smart Grid Subcommittee Overview and Goals for Ongoing Federal/State Collaboration By George Arnold, NIST & Jessica Zufolo, RUS NARUC Annual Convention,
1 The Partnership Challenge Higher education’s missions are realized in increasingly global, collaborative, online relationships –Higher educations’ digital.
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant and Naomi.
1 National Strategy for Trusted Identities in Cyberspace Identity in Cyberspace: Improving Trust via Public-Private Partnerships Jeremy Grant Senior Executive.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
OpenStand Principles for the modern paradigm for standards development.
A DESCRIPTION OF CONCEPTS AND PLANS MAY 14, 2014 A. HUGHES FOR TFTM The Identity Ecosystem DISCUSSION DRAFT 1.
1 National Strategy for Trusted Identities in Cyberspace National Strategy for Trusted Identities in Cyberspace Jeremy Grant NIST April 6, 2011.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Stuff, including interfederation stuff Dr Ken Klingenstein, Director, Middleware and Security, Internet2.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
Privacy and Security Solutions For Interoperable Health Information Exchange Presented by Linda Dimitropoulos, PhD RTI International Presented at AHRQ.
Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
Identity Federations: Here and Now David L. Wasley Thomas Lenggenhager Peter Alterman John Krienke.
The Value of Creating the Identity Ecosystem. The Identity Ecosystem Steering Group (IDESG) is the source of expertise, guidance, best practices and tools.
19-20 October 2010 IT Directors’ Group meeting 1 Item 6 of the agenda ISA programme Pascal JACQUES Unit B2 - Methodology/Research Local Informatics Security.
Information Sharing for Integrated Care A 5 Step Blueprint.
Progress Report on the U.S. NSTIC Efforts Jack Suess – Delegate for Research, Development, Education & Innovation
Department of Internal Affairs Disrupting Government Service Models Tim Occleshaw Government Chief Technology Officer Service and System Transformation.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
World summit on the information society 1 WSIS: Building the Information Society: a global challenge in the new Millennium Tim Kelly, Claudia Sarrocco.
International Telecommunication Union ICT Security Role in National Trusted Identities Initiatives Abbie Barbir, PhD ITU-T Study Group 17 Identity Management.
ANSI – ESOs meeting Washington February 2017
NATIONAL e-STRATEGY Presentation to the Portfolio Committee on Telecommunications & Postal Services DG: ROBERT NKUNA AUGUST 2017 Building a better life.
Update from the Faster Payments Task Force
Information Security Review Panel Report
ATIS Priorities and Initiatives Susan Miller, President & CEO, ATIS
Summit 2017 Breakout Group 2: Data Management (DM)
SACREEE FOR MARKET-BASED ADOPTION OF RENEWABLE ENERGY AND ENERGY EFFICIENCY SADC Renewable Energy Entrepreneurship Support Facility Workshop 27 April.
IEEE Initiatives in Artificial Intelligence and Autonomous Systems
Privacy, Security, and Identity Management Update
National Strategy for Trusted Identities in Cyberspace Jeremy Grant
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
Standards for success in city IT and construction projects
U.S. Federal e-Authentication Initiative
ONC P2 FHIR Ecosystem Task Force
EOSC Governance Development Forum
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
ATIS Priorities and Initiatives Susan Miller, President & CEO, ATIS
IEEE Initiatives in Artificial Intelligence and Autonomous Systems
Juan Gonzalez eGovernment & CIP operations
Panelists ASIS International – Dr. Marc Siegel, Security Management System Consultant, ASIS International Disaster Recovery Institute International (DRII)
National Strategy for Trusted Identities in Cyberspace
Presentation transcript:

Higher Education’s Role in the Identity Ecosystem Peter Alterman, NIST Renee Shuey, Penn State Ken Klingenstein, Internet2 Jack Suess, UMBC

Status Update: National Strategy for Trusted Identities in Cyberspace Peter Alterman NIST

What is NSTIC? Called for in President’s Cyberspace Policy Review (May 2009): a “cybersecurity focused identity management vision and strategy” Guiding Principles Privacy-Enhancing and Voluntary Secure and Resilient Interoperable Cost-Effective and Easy To Use NSTIC calls for an Identity Ecosystem, “an online environment where individuals and organizations will be able to trust each other because they follow agreed upon standards to obtain and authenticate their digital identities.”

What does NSTIC call for? Private sector will lead the effort Federal government will provide support Not a government-run identity program Industry is in the best position to drive technologies and solutions Can identify what barriers need to be overcome Help develop a private-sector led governance model Facilitate and lead development of interoperable standards Provide clarity on national policy and legal framework around liability and privacy Act as an early adopter to stimulate demand

Privacy and Civil Liberties are Fundamental Increase privacy Minimize sharing of unnecessary information Minimum standards for organizations - such as adherence to Fair Information Practice Principles (FIPPs) Voluntary and private-sector led Individuals can choose not to participate Individuals who participate can choose from public or private-sector identity providers No central database is created Preserves anonymity Digital anonymity and pseudonymity supports free speech and freedom of association

So Far? Hosted the Workshop on Governance, June 9, 10 in Washington, DC Hosted the Workshop on Privacy, June 27 & 28 in Boston Support industry-led initiative to create an OASIS Trust Elevation Technical Committee to investigate current and new transaction trust and trust elevation methods as an approach to correlating risk assessment approach to credential trust with NIST 800-63 Convene the Private Sector Support for existing eGovernment and federated identity management initiatives directly and indirectly through participation in identity management related work with formal and informal sector players such as ISOC, Kantara, OASIS, ANSI, ISO, ITU-T, TSCP, ABA, SAFE-BioPharma, CertiPath, W3C, The Open Group, others Many Agency pilots incorporating federated authentication in play, including Health IT in play today Government as an early adopter to stimulate demand

The Plan Going Forward Perhaps other Workshops as partners identify needs (legal issues? Attributes? Others?) Continue outreach activities Convene the Private Sector Establish a Functioning Governance Entity for the Identity Ecosystem by the end of 2011 Private sector led; multi-stakeholder collaboration Enable adoption of consensus standards and operating rules, including risk-based models for trust assessment Explore models for addressing liability Support adoption of effective attribute management architectures and model implementations Pilots: Develop criteria for selection Assess proposed initiatives Prepare for formal pilot launches with funding in FY12 FY11 Focus Ensure government-wide alignment with the Federal Identity, Credential, and Access Management (FICAM) Roadmap Increased adoption of Trust Framework Providers (TFP) Encourage agencies to enable federated trust at all LOA to provide online services to citizens Government as an early adopter to stimulate demand

Discussion Topics? Questions? National Program Office, NSTIC nstic@nist.gov Dr. Peter Alterman Peter.alterman@nih.gov 240-507-7107

Panel Discussion