Back to Results
First PageMeta Content
National Strategy for Trusted Identities in Cyberspace / Identity management / Identity theft / Digital identity / Authentication / Chief information officer / Provisioning / Identity / Security / Computer security


NASCIO Call-to-Action: The Necessity for Maturing Identity and Access Management in State Government November 2012
Add to Reading List

Document Date: 2012-11-28 13:57:36


Open Document

File Size: 1,03 MB

Share Result on Facebook

City

Lexington / /

Company

NASCIO State Digital Identity Working Group / NSTIC Steering Group / Ecosystem Steering Group / NASCIO Digital Identity Work Group / eID Working Group / /

Country

United States / /

/

Facility

store Personally Identifiable Information / /

/

IndustryTerm

interoperable enterprise identity management solution / un-auditable identity management systems / security infrastructure / communications efforts / identity management systems / transportation / enterprise identity services / priority enterprises services / information technology executives / access management solution / identity services / banking / government-wide services / un-audited identity management systems / law enforcement / enterprise-wide identity management solution / access management / /

MarketIndex

ROI / /

Organization

National Association of State Chief Information officers / U.S. Department of Health and Human Services / White House / U.S. Department of Justice / American Association of Motor Vehicles Administrators / State Government / U.S. Department of Homeland Security / Bureau of Justice Statistics / NSTIC National Program Office / U.S. Department of Transportation / DOJ / NSTIC Secretariat / Department of Motor Vehicle / /

Person

Efforts Individual / Chad Grant / NASCIO NASCIO / /

/

Position

driver / President / Senior Policy Analyst / Major / chief information officers and information technology executives / Chief Information Security Officers / /

ProvinceOrState

Kentucky / Virginia / Michigan / /

Technology

encryption / information technology / smartphones / http / pdf / /

URL

http /

SocialTag