Speakers at the SIA government summit will offer insights about the ICAM roadmap 
The summit will provide update on the federal identity, credential and access management (ICAM) initiative
The Security Industry Association has announced the panelists for the ICAM discussion at the Government Summit in Washington, D.C., in June.

The session, which is planned for the second day of the June 8-9 event, will provide an update regarding the federal identity, credential and access management (ICAM) initiative. The Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance was released in November 2009 to help agencies gain security, cost and interoperability benefits in their identity management programmes and is an important document for security product manufacturers who have or are pursuing government contracts.

The panelists scheduled for the Government Summit discussion include:

  • Kevin Brault, Director, Deloitte Consulting
  • Hunter Knight, President, Integrated Command Software
  • Hayri Tarhan, Sales Consulting Manager, Oracle
  • Rob Zivney, Vice President for Marketing and Business Development, Hirsch Electronics

Diebold Vice President John Stroia will moderate the discussion.

The panelists will offer insights from varying perspectives about the roadmap document and will comment on the second phase of the ICAM initiative, which is tentatively scheduled for release later this year.

The Government Summit is the premier public policy conference in the security industry. In addition to panel discussions on security issues, the event will feature talks from former Department of Homeland Security Secretary Michael Chertoff, General Services Administration Administrator Martha Johnson, Pulitzer Prize-winning columnist George Will and former White House Press Secretary Mike McCurry. More information is available on the SIA web site.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?