Identity and access management is essential to modern cybersecurity. As agencies transform their IT environments through the adoption of cloud solutions, they need to ensure they can easily manage which users have access to which applications and data
Posts Tagged: IAM
As telework has expanded across government, and will likely permanently shift the paradigm of public and private sector work, technologists have had to pay special attention to maintaining security while not stifling users.
Agencies need to begin building citizen trust now, and one way is by offering consistently secure access to information.
Customer identity and access management (CIAM) is a complex undertaking, requiring agencies to manage user logins, self-service registration and identity databases at scale.
North Carolina’s Deputy State CIO talks about her biggest pride points in 2019, why her middle name is “blockchain” and why she works in government.
At NASCIO’s 50th anniversary, GovLoop spoke with state chief information officers about the tech priorities they’re focusing on in 2020.
When you consider the law enforcement sector and how often cases span cities, counties and even state lines, it’s imperative that governments can coordinate and easily share information. A federated identity system could lay the groundwork for new systems that allow for these seamless connections.
Adam Zeimet, Branch Chief for ICAM at the Agriculture Department, has been with the program since it started. It’s evolved since then to support more than 120,000 employees and 750,000 public users. He talked to GovLoop about central considerations to ICAM at the agency.
The role of identity governance is simple in principle: give the right people the right access to the right data. To do this, trusted and properly managed identity access has to become the primary control.
Brandon Iske, ICAM Lead at the Defense Information Systems Agency (DISA), talked to GovLoop about the agency’s focus on IAM issues and its future plans.