Member Resources : Educational Resources : Federated Identity, Strong Authentication, NSTIC and the Identity Ecosystem

Educational Institute

Federated Identity, Strong Authentication, NSTIC and the Identity Ecosystem


The 12th Annual Smart Card Alliance Government Conference

Walter E. Washington Convention Center • Washington DC
Monday, October 14, 2013

This full-day interactive workshop will provide attendees with a detailed understanding of the critical aspects of deploying EMV solutions for issuers, acquirers/processors, and merchants in the U.S. business environment. Attendees will take away a thorough understanding of the changes required in the payments infrastructure for implementing EMV in the U.S. The workshop includes discussion on how EMV testing and certification processes differ from current processes, how retailers can plan for EMV migration, how NFC and mobile payments transactions are impacted by EMV, and what transit agencies need to consider in migration. The panel concludes with a user panel where leading organizations will discuss how they preparing for EMV migration.

Introductions

Randy Vanderhoof, Smart Card Alliance

This opening session introduces the Smart Card Alliance and the Smart Card Alliance Educational Institute and discusses the agenda and presenters for today’s workshop.

Watch the Presentation | Download the Slides

NSTIC Overview

Ray Kimble, Deloitte

This session provides an overview of NSTIC, its vision and principles, and the pilots and other activities that are underway.

Watch the Presentation | Download the Slides

The Identity Ecosystem Steering Group (IDESG)

Jim Zok, IDESG Management Committee

This session provides an overview of the organization and activities of the IDESG, which was created to administer the development of policy, standards, and accreditation processes for the Identity Ecosystem Framework.

Watch the Presentation | Download the Slides

Fundamentals of a Federated Identity Infrastructure

Sal D’Agostino, IDmachines

This session provides the foundation for understanding how a federated identity infrastructure works and how the NSTIC Identity Ecosystem is envisioned to function.

Watch the Presentation | Download the Slides

Identity Levels of Assurance

Lars Suneborn, Oberthur Technologies

This session provides an overview of what different levels of assurance are used in identity verification and how the level of assurance impacts users, identity providers and relying parties.

Watch the Presentation | Download the Slides

Technologies and Tokens Used in the Identity Ecosystem

Bryan Ichikawa, Deloitte and Myisha Frazier-McElveen, Deloitte

This session provides an overview of the different technologies and tokens that will be used in the Identity Ecosystem and that will cover a broad spectrum of use cases and levels of assurance.

Watch the Presentation | Download the Slides

Identity Ecosystem Use Cases – Healthcare

Michael Magrath, Gemalto

This session provides a holistic view of the variety of healthcare identity ecosystem use cases. The use cases cover what tokens, technologies, and levels of assurance may be used for different functions and applications; how existing credentials could be used within the NSTIC identity ecosystem for healthcare; and how implementations should factor in privacy considerations.

Watch the Presentation | Download the Slides

Identity Ecosystem Use Cases–Financial

Rajesh Shenoy, Citi

This session provides a holistic view of the variety of financial identity ecosystem use cases. The use cases cover what tokens, technologies, and levels of assurance may be used for different functions and applications; how existing credentials could be used within the NSTIC identity ecosystem for financial services; and how implementations should factor in privacy considerations.

Watch the Presentation | Download the Slides

Identity Ecosystem Use Cases–Government-to-Citizen Services

Christian Ali, SecureKey Technologies

This session provides a holistic view of the variety of government-to-citizen identity ecosystem use cases. The use cases cover what tokens, technologies, and levels of assurance may be used for different functions and applications; how existing credentials could be used within the NSTIC identity ecosystem for government-to-citizen services; and how implementations should factor in privacy considerations.

Watch the Presentation | Download the Slides

Identity Ecosystem Use Cases–Government-to-Government Services

Frazier Evans, Booz Allen Hamilton

This session provides a holistic view of the variety of government-to-government identity ecosystem use cases (e.g., using the Personal Identity Verification (PIV) credential or Common Access Card (CAC)). The use cases cover what tokens, technologies, and levels of assurance may be used for different functions and applications; how existing credentials could be used within the NSTIC identity ecosystem for government-to-government services; and how implementations should factor in privacy considerations.

Watch the Presentation | Download the Slides

Mobile Devices as Identity Credential Carriers

Neville Pattinson, Gemalto

This session focuses specifically on mobile devices as identity credential carriers and reviews how they will fit into the Identity Ecosystem.

Watch the Presentation | Download the Slides

Identity Ecosystem Roundtable

This roundtable discusses and debates the technology trade-offs for the Identity Ecosystem. What are the advantages and disadvantages of different technologies and tokens and how will they fit together in the identity ecosystem?

Watch the Presentation