Speakers at the SIA government summit will offer insights about the ICAM roadmap 
The summit will provide update on the federal identity, credential and access management (ICAM) initiative
The Security Industry Association has announced the panelists for the ICAM discussion at the Government Summit in Washington, D.C., in June.

The session, which is planned for the second day of the June 8-9 event, will provide an update regarding the federal identity, credential and access management (ICAM) initiative. The Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance was released in November 2009 to help agencies gain security, cost and interoperability benefits in their identity management programmes and is an important document for security product manufacturers who have or are pursuing government contracts.

The panelists scheduled for the Government Summit discussion include:

  • Kevin Brault, Director, Deloitte Consulting
  • Hunter Knight, President, Integrated Command Software
  • Hayri Tarhan, Sales Consulting Manager, Oracle
  • Rob Zivney, Vice President for Marketing and Business Development, Hirsch Electronics

Diebold Vice President John Stroia will moderate the discussion.

The panelists will offer insights from varying perspectives about the roadmap document and will comment on the second phase of the ICAM initiative, which is tentatively scheduled for release later this year.

The Government Summit is the premier public policy conference in the security industry. In addition to panel discussions on security issues, the event will feature talks from former Department of Homeland Security Secretary Michael Chertoff, General Services Administration Administrator Martha Johnson, Pulitzer Prize-winning columnist George Will and former White House Press Secretary Mike McCurry. More information is available on the SIA web site.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...