COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April 2007. The key objectives of the Strategy,

Slides:



Advertisements
Similar presentations
E-Signature application in Business Process Management Loan Application Processing The Prototype Baltic IT&T 2007 Conference Riga, April Juris.
Advertisements

© 2010 IBM Corporation Doing More with Less A Strategy for Improving Trust in Identities in an Era of Tight Budgets November 2010.
© Daon Confidential Strategies for Implementing National Identity Systems Nov 28 th 2007 Leo Ring Vice President, Daon.
What is On Time Booking? Reservation and distribution system for passenger transport companies (airlines and ferries ) Tool that helps you to manage the.
AFCEA TechNet Europe Identity and Authentication Management Systems for Access Control Security IDENTITY MANAGEMENT Good Afternoon! Since Yesterday we.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
A l a d d i n. c o m eToken NG-OTP Combined PKI - OTP Authentication Solution November, 2008.
The Federation for Identity and Cross-Credentialing Systems (FiXs) FiXs ® - Federated and Secure Identity Management in Operation Implementing.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Identity cards and systems Professor M. Angela Sasse University College London Professor Brian Collins RMCS Shrivenham.
“Personal Identity Verification (PIV) of Federal Employees and Contractors” October 27, 2005 Homeland Security Presidential Directive 12 (HSPD-12)
Department of Labor HSPD-12
Paragon Dynamics Info Systems Private Limited 0 NVOCC Dynamics -Key Features.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Computer Security Biometric authentication Based on a talk by Dr J.J. Atick, Identix, “Biometrics in the Decade of Security”, CNSS 2003.
Damasoft Pvt Ltd About Damasoft IT industry is going through many challenges in the way software is being developed. The reason for this is software engineering.
FICAM Testing Program For more information, please contact GSA-FICAM- The FIPS 201 Evaluation Program is now the FICAM Testing.
Ganguly & Associates July, Ganguly & Associates We add value to your business, practically 2 Ganguly & Associates Agenda  About Us  Service Offerings.
Government Connect Microsoft CGF Integration Solution 2006 Overview Dave Cattanach, Microsoft.
Biometrics in New Zealand Passport issuing Border crossing System and information access Building access.
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Emergence of Identity Management: A Federal Perspective Dr. Peter Alterman Chair, Federal PKI Policy Authority.
Copyright 2009 FUJITSU TECHNOLOGY SOLUTIONS PRIMERGY Servers and Windows Server® 2008 R2 Benefit from an efficient, high performance and flexible platform.
Electronic Authentication for Flexible Learning Workshop Presentation (5 August 2003) Chris Connolly, CEO, Galexia Consulting.
Ronny Depoortere January 16th, 2012 Chisinau. Identification – Business Case The ability to uniquely identify citizens and foreign residents is the corner.
Introduction to SAP R/3.
Geneva, Switzerland, September 2014 Introduction of ISO/IEC Identity Proofing Patrick Curry Director, British Business Federation Authority.
Optimizing Business Operations Business Priorities Presentation.
Certificate and Key Storage Tokens and Software
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Digital Delivery of eServices Kerry Munro Group President, Digital Delivery Network, Canada Post Corporation Toronto November 20, 2012 CONFIDENTIAL.
Large-Scale, Cost-Effective, Progressive Authentication and Identify Management Solutions Enabling Security, Efficiency and Collaboration through Technology.
Problems with reuse – Increased maintenance costs; lack of tool support; not-invented- here syndrome; creating, maintaining, and using a component library.
CNRI Handle System and its Applications
Ronny Depoortere 19th March, 2012 Warsaw. Identification – Business Case The ability to uniquely identify citizens and foreign residents.
PIV 1 Ketan Mehta May 5, 2005.
Electronic authentication: validating and verifying customer identities and bank details Presented by: Stan Matthews & Scott Robertson 13 th November 2007.
Prepared by Niteo Partners: An NEC Company Security Requirements for Financial Web Services XML Web Services One Conference Forum on Security Standards.
U.S. General Services Administration Federal Technology Service November 9, 1999 Judith Spencer Director, Center for Governmentwide Security Office of.
SPT - the way travel should be!. Current Environment  Check-in, security and border clearance processes are resource intensive  High staff costs, cumbersome.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
LUCIDITY SOFTWARE GREATER CLARITY MAKES ORGANISATIONS MORE INTELLIGENT.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
1 European eGovernment Awards 2007 European eGovernment Awards 2007 Workshop for Finalists July, Brussels LIMOSA Belgium Reference project number.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Compete strategically in the enterprise—sell Microsoft Application Platform. Help grow revenue and accelerate adoption and Software Assurance attach. Microsoft.
ILink Systems, Inc Feb, 2014 Government IT Solutions.
Identity Management Overview
Identity and Access Management
Cyber Security Means Locking the Front Door Too: Use High-Assurance Identity Management to Control Access to the Federal Bridge.
Time Attendance Management System TAMS
Tokens & Proofing De-Mystified
Chris Farmer Director of Fraud Strategy
NAAS 2.0 Features and Enhancements
Central e-Government Products: Current & Planned
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Getting Started.
CLEARTM Media ERP and Azure
Legal Framework for Civil Registration, Vital Statistics
Getting Started.
Introduction of ISO/IEC Identity Proofing
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
InfiNET Solutions 5/21/
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Presentation transcript:

COAG AUSTRALIA The Prime Minister, Premiers and Chief Ministers signed the IGA at the COAG meeting on 13 April The key objectives of the Strategy, as set out in the IGA and detailed in the reports to COAG, include: improving standards and procedures for enrolment and registration for the issue of proof of identity documents (POI) enhancing the security features on POI documents to reduce the risk of incidence of forgery establishing mechanisms to enable organisations to verify the data on key POI documents provided by clients when registering for services improving the accuracy of personal identity information held on organisations' databases

COAG Cont enabling greater confidence in the authentication of individuals using online services, and enhancing the national inter-operability of biometric identity security measures. At that meeting, COAG also noted the progress made to date in giving effect to the six to the six elements of the Strategy, and acknowledged the value of this work in providing guidance to government.

From Standard Identity To Scaleable Higher Security Capabilities – Governments should provide plan for a standard, secure, reliable and comprehensive backbone solutions for identity assurance and credentialing for all types of instruments whether they be for public (driver licences, permits, accessing government resources e.g portals, payments local government etc) or for employees and others (logical and physical access) – both government and also designated private sector critical industries (banking, telco, utilities, transport, aviation, ports) – Credentialing and identity management functions that can be started as basic backbone structures and migrated to higher levels of security providing for… o Background checks (1:1, 1:n) Fingerprint based and biographic based International and national government agencies and local record searches o Biometric processing o Uniqueness checks o Payload and credential creation (desktop, central issuance or mix) o Payment processing o Systems management and reporting Kevin Beck

What Identity CARDS Should Be Mandated to What levels of Security Web ID Benefits Eligibility, and Access Portals NBN Logical and physical Identity and access Driver Firearms Other Licences Define Security Levels Kevin Beck Social & Permits High Security Licenses High Govt Parliament Agencies, Police, Responders High By Job & Industry Rated Civil – Differing Levels depending on Criticality Government Critical transport, utilities, ports water, banking Logical and physical identity and access,. Lower Identity Web Id Students Specific Workers Licences Proof of age Permits Instruments and data, can be protected and carried on the National Broadband Network

INSTRUMENTS Interoperability STANDARDS PROGRAM SECURITYEFFICIENCY Single &Multi- Operation Logical and Physical FIPS 201 and ICAO standards Reducing or eliminating : Fraud and Misuse Unauthorised Access Logical and Physical – Airports and Ports Replace manual or paper-based workflows Reduce identity costs Should be built upon major industry standards (FIPS and ICAO) via a modular framework Differing levels Secure transport and central storage of data (identity, credential, cryptographic keys) Secure configurable automated workflows which can be adapted over time Cost-effective (proven integrated COTS software) – reduction of development & maintenance costs while decreasing program risk (with custom solutions) Utilise the National Broadband Network Create an issuance backbone that is Scaleable For higher security Strong authentication (1, 2 or 3 factor authentication) Vendor lock-in avoidance due to open system architecture Known cost – common platforms for all agencies, multi-ops, eliminate need for multiple cards Elimination of price gouging Assured identity and credential security proven using integrated COTS software Integrated end-to-end chain-of- trust Issuance and post issuance Quickly & easily deployed solution proven integrated COTS software