Adam Zeimet, Branch Chief for ICAM at the Agriculture Department, has been with the program since it started. It’s evolved since then to support more than 120,000 employees and 750,000 public users. He talked to GovLoop about central considerations to ICAM at the agency.
Posts Tagged: IAM
The role of identity governance is simple in principle: give the right people the right access to the right data. To do this, trusted and properly managed identity access has to become the primary control.
Brandon Iske, ICAM Lead at the Defense Information Systems Agency (DISA), talked to GovLoop about the agency’s focus on IAM issues and its future plans.
A Senior Policy Adviser at NIST’s Trusted Identities Group shared government trends and what identity and access management means for everyday employees.
Written in collaboration with Kolin Whitley, Director of Fraud and Identity Solutions, Experian Public Sector Picture a novice internet user logging on to a government portal for the first time. He’s using a desktop computer, and the process takes him a few minutes because he isn’t very tech-savvy. He also doesn’t have any details fromRead… Read more »
Cybersecurity is an inescapable and urgent priority for everyone. No matter what sector you’re in or what device you’re using, securing your information and network is critical. To help keep you in the cyber loop, GovLoop’s 4th Annual Government Innovators Virtual Summit hosted the session: Cybersecurity Trends and Strategies You Need To Know. During thisRead… Read more »
The following post is an excerpt from GovLoop’s recent executive research brief, Transforming Agency Security with Identity and Access Management. In the brief, we discuss the importance of consolidating and automating IAM systems to better secure information at government organizations. The first step to securing user accounts and privileges at your agency is to consolidate all currentRead… Read more »
“You’ve been hacked.” That is the line that every person dreads waking up to in their inbox. But securing your identity and your privacy is no easy task. The government has been using identity and access management tools for years, commonly known as IAM. IAM uses a four part verification process that helps cut downRead… Read more »