Loading Events

Federal ICAM Day

February 26, 2024, 10 AM – 4 PM ET |GSA HQ, 1800 F St., NW, Washington, DC

The GSA is co-sponsoring this event with ATARC
Register
}

10:00 AM

Welcome & Opening Remarks

Dan Pomeroy

Dan Pomeroy

Deputy Associate Administrator, Office of Technology Policy, U.S. General Services Administration

}

10:15 AM

General Session

 

Jeremy Grant

Jeremy Grant

Managing Director, Technology Business Strategy, Venable

Presentation: Successes and Failures of Interoperability for Government Identity.
Christine Owen

Christine Owen

Field Chief Technology Officer, 1Kosmos

Presentation: Friction of User Experience for the Citizen and the Employee. 
Ken Myers

Ken Myers

Director, Identity Assurance and Trusted Access Division, U.S. General Services Administration

Presentation: Federation Barriers to Tackle and a Path Forward. 
}

11:00 AM - 3:00 PM

Breakout Sessions

Each Breakout Session is aligned with a federation challenge identified by the ATARC IdM Working Group. 

 

Session #1 – Why Would Anyone in Government Build a Service to be Trusted?

The lack of an adopted and agreed to Trust Framework to enable agencies to trust more than a point-to-point assertion of identity.

Catherine Bergan

Catherine Bergan

Security Project Manager, Internal Revenue Services

Bryan Rosensteel

Bryan Rosensteel

U.S. Federal Chief Technology Officer, Ping Identity

Session #2 – ICAM is Trapped in Time

The existence and overreliance on legacy systems that became the de facto backbone of many ICAM systems but was never truly intended for that purpose.

Adam McBride

Adam McBride

HHS HSPD-12 IT Program Manager, U.S. Department of Health and Human Services (invited)

Brian Dack

Brian Dack

Director, Federal Solutions Engineering, Okta

Session #3 – No Agency Owns the Federal ICAM Function

The U.S. Government ICAM story is rooted in Credential Management. The shift to centralized credential management as supported in FIPS-201-3 will require each agency to maintain its own Identity Provider (IdP). The lack of direction for how to manage agency-level IdPs with a centralized credentialing system could allow for federated users to have too much or too little access to needed resources.

Ross Foard

Ross Foard

IT Specialist, Cybersecurity and Infrastructure Security Agency

David Treece

David Treece

Vice President, Solution Architecture, Yubico

Session #4 – There are No Standardized Cost Models for ICAM

ICAM is not necessarily a “first class” citizen when it comes to being considered critical infrastructure that creates funding and implementation challenges.

Darlene Gore

Darlene Gore

Director, Identity Credential and Access Management, Office of Information Technology Category, Federal Acquisition Service, U.S. General Services Administration (invited)

Kelvin Brewer

Kelvin Brewer

Director of Public Sector Sales Engineering, Ping Identity

Session #5 – We Build to Policy and Access to Data — Not Standards and Profiles

The lack of standards to support multipoint Identity Federation has created various islands of misfit identity silos across the government.

Tom Clancy

Tom Clancy

Principal Identity, Credential, and Access Management (ICAM) Engineer, MITRE

Zach Berkowitz

Zach Berkowitz

IdAM Technical Oversight Lead, Booz Allen Hamilton

}

3:00 PM - 4:00 PM

Closing Session

Summary of the progress made in the breakout sessions. 

Create Tiger Teams. 

Register

By submitting this form you acknowledge receipt of and consent to ATARC’s Privacy Policy For further information, please review our complete Privacy Policy. By registering for this event you agree to receive event reminders via email, text, and/or phone call communications.

Zoom for Government enables ATARC remote collaboration opportunities through its cloud platform for video and audio conferencing, chats and webinars across all devices. Allowing for individuals from all areas of government, industry and academia to communicate directly. 

*** ATARC is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.nasbaregistry.org. Program Level: Overview, no prerequisites required. Advance preparation: none. Delivery Method: Group Live. Field of Study: Information Technology. Registration #140762. In accordance with the standards of the National Registry of CPE Sponsors, CPE credits have been granted based on a 50-minute hour. Refund, cancellation and complaint resolution policy.