Preparing your Implementation Plan

Slides:



Advertisements
Similar presentations
June 27, 2005 Preparing your Implementation Plan.
Advertisements

Writing the Team Report Chairs and Evaluators Workshop.
Status of U.S. Smart Card Deployment Jim Dray Porvoo 7/ World eID Meeting May 2005.
1 HSPD-12 Compliance: The Role of Federal PKI Judith Spencer Chair, Federal Identity Credentialing Office of Governmentwide Policy General Services Administration.
NIH is a Valuable Place with Valuable People: We Need to Protect it! Cyber threat is one of the most serious economic and national security challenges.
Presented to: NDIA PMSC By: Keith Kratzert Date: January 29, 2009 Federal Aviation Administration Improving Program Performance at FAA.
1 Securing U.S. Federal Information Systems and Beyond: NIST Activities and Other Government Initiatives Ed Roback Chief, Computer Security Division April.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
1 1 A Synopsis of Federal Information Processing Standard (FIPS) 201 for Personal Identity Verification (PIV) of Federal Employees and Contractors Presentation.
Alicia Albright, Spencer Ruch, Jim Knapp, Brian Holkeboer, Anthony Santilli.
Department of Health and Human Services Personal Identity Verification Training APPLICANT.
1 Federal Identity Management and Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Nairobi, Kenya 29-31October Fifth Special Meeting of the Counter- Terrorism Committee with International, Regional and Subregional Organizations.
USCG Enforcement for the Implementation of TWIC
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
SITS:Vision Annual the Hilton Deansgate Hotel, Manchester Gary Williams – Business Development Director Electronic Evidence July 2011.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
Office of the Chief Information Officer EFCOG Annual Meeting Fred Catoe (IM-32) U.S. Department of Energy.
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
First Practice - Information Security Management System Implementation and ISO Certification.
1 Implementation of Homeland Security Presidential Directive 12 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide FED/ED.
Enhancing Information Systems Security Through Biometrics October 2004 Security Strategy for a Biometrics Deployment Catherine Allan, M.A., CISSP, CD Allan.
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov FICAM Testing Program and Approved Products List (APL) Overview.
IdM Identity Proofing & Registration Gary Chapman David Millman September 2006.
1st MODINIS workshop Identity management in eGovernment Frank Robben General manager Crossroads Bank for Social Security Strategic advisor Federal Public.
Homeland Security Presidential Directive-12 (HSPD-12)
Commonwealth Office of Technology Finance and Administration Cabinet Electronic Signature Overview Name:Chris Clark Date: October 28, 2004.
HSPD-12 and FIPS-201 Overview v Learning Objectives At the end of this course, you will be able to: Describe Homeland Security Presidential Directive.
CERCA: Healthcare Working Group Fall Meeting October 12, 2011.
Requirements Development & Template Presentation to All Chairs 8/12/2014.
1 The Government-wide Implementation of Homeland Security Presidential Directive 12 (HSPD-12) David Temoshok Director, Identity Policy and Management GSA.
Page 1 EmpowHR Adjudicator.
Presented by: Jay Maxwell CIO, AAMVA The Driver’s License: Finally, National Standards Presented by: Jay Maxwell CIO, AAMVA.
NAPHSIS REAL ID Overview June 6, 2007 In support of this key requirement,
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
HSPD-12 Identity Management Initiative Carol Bales Senior Policy Analyst United States Office of Management and Budget North American Day 2006.
Intelligence Reform & Terrorism Act – The Act – Intelligence Reform & Terrorism Act – The Act – -The Process- Centers for Disease Control and Prevention.
VAM for the Future VAM for the Future Integrating the Vehicle Allocation Methodology Process Into Federal Fleet Management Presented by the General Services.
TECHNICAL SEMINAR PRESENTATION BIOMETRICS:THE MAGIC OF IDENTIFICATION.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
The Sybil attack “One can have, some claim, as many electronic persons as one has time and energy to create.” – Judith S. Donath.
1 Federal Identity Management Infrastructure and Policy David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide August 15,
PERSONAL SERVICE CONTRACTS MEMORANDUMS OF AGREEMENT PROCESS Amy Monroe, Procurement Teri Mason, Budgets Thelma Hawkins, Grants Management Karen Wirth,
www.service.tas.gov.au IDEAS Service Tasmania Unit.
The technology behind the USPS EPM. AND COMPLIANCE March 25, 2004 Adam Hoffman.
 Comprehensive interview findings will be proposed and drafted into the first drafts of the Full Committee draft Final Report due by early may.  The.
European preparations for the WCIT
Administrative Capability A NASFAA Authorized Event Presented by Janette Roszell Assistant Director of Financial Aid & Compliance Georgia Gwinnett.
Anna Preston Vance, HA of Paris
Applications of Cryptography
Catoosa County Schools
الوحدة 20 مهارات التواصل مع الآخرين
UNLV Data Governance Executive Sponsors Meeting
E-Authentication: What Technologies Are Effective?
PIMC Semiannual Report- Quality January – June 2017
Appropriate Access InCommon Identity Assurance Profiles
ENG 1D1 Thursday May 28th, 2015.
Reporting and Water Information System for Europe (WISE)
Theme 4: Regional Communication and Information Sharing
Coaching for Development
Session 4: Finalize Project Working Arrangements
Who Wants to Win… 100 GRAND.
ONC Update for HITSP Board
Presentation transcript:

Preparing your Implementation Plan June 27, 2005 Preparing your Implementation Plan

Streamlining the Requirement: Using the Template Based on the Control Objectives from HSPD-12 Approximately 20 Multiple choice questions: 1 – Not started. Agency has not begun implementing the specific requirement or current process/implementation is not sufficient. 2 – Planning in progress. Agency has begun the planning necessary to meet the specific requirement. 3 – Planning complete, acquisition underway. Agency has completed the necessary planning to meet the specific requirement. If an acquisition is required, the acquisition plan has been completed or it is underway. 4 – Implementation in progress. Agency is acquiring or implementing the products or services to meet the specific requirement. 5 – Implementation Complete. Agency has fully met the specific requirement.

Control Objectives 1) Identification Issued based on sound criteria for verifying an individuals identity 2) Identification that is issued only by providers whose reliability has been established by an official accreditation process 3) Identification that is strongly resistant to identity fraud, tampering, counterfeiting, and terrorist exploitation 4) Identification that can be rapidly authenticated electronically Plus: Agency meets all security and privacy control objectives

The Agency Plan Over the next two days: Tomorrow afternoon: Think about the information being provided in the context of your agency Determine where your agency falls in the process and what needs to be done. Tomorrow afternoon: We will walk through the draft agency plan and discuss the questions individually

Keep In Mind: The Dates October 27, 2005 – Compliance with FIPS 201 Part 1 October 27, 2006 – Compliance with FIPS 201 Part 2