Conference Agenda & Proceedings
*subject to change
|
|
8:30 | Coffee & Registration |
9:00 |
OPENING PLENARY
Keynote Addresses:
Remarks from Satellite Countries: Belarus, Georgia, Moldova, Rwanda VIEW WEBCAST |
10:30 | Coffee Break |
10:45 |
SESSION B: Designing and Implementing Secure ID Management Systems: Country Experiences
|
12:30 | Lunch in the Auditorium Foyer |
1:30 |
SESSION C: Privacy and Identity Management: Two Critical Ingredients of Trusted Cloud Computing
|
3:00 | Break |
3:15 |
SESSION D: What You Know-What You Have-What You Are: The Role of Hardware Technologies to Provide Identity Assurance
|
5:00 |
Day One Ends |
|
|
8:30 | Morning Coffee |
9:00 |
SESSION E: Enabling Identity and Attributes between Federations and Governments
|
10:30 |
Coffee Break |
11:00 |
SESSION F: Insuring Confidentiality: Encryption, Data Retrieval, Key Management Technologies What management technologies are available to ensure confidentiality as enterprises navigate to cloud solutions? This session looks at some approaches to managing operational risk by protecting valuable digital assets, achieving compliance with regulatory mandates, and leveraging industry standards for data confidentiality.
VIEW SESSION SLIDES |
12:30 | Lunch in the Auditorium Foyer |
1:30 |
SESSION G: Managing Risk & Reducing Online Fraud Using New Security Technologies Building trusted identity systems and effectively deploying and managing online trust systems are critical components of cybersecurity and essential for reducing online fraud and cybercrime. Although some strategies recognize the value of anonymity for many online transactions and the need for reliable, low-assurance identity systems, sensitive and high-value transactions, such as online banking or accessing electronic health records, require strong linkages to trusted identities, role and context, and other attributes. As we move to federated systems, parties must have confidence in the underlying identity infrastructure. The speakers in this session will demonstrate real-world solutions, including technologies, standards and practices, to enable trust and support effective online risk management.
|
3:00 | Break |
3:30 |
SESSION H: Security Gaps & Solutions in the Cloud
|
5:00 |
Cocktail Reception at the Washington Marriott Hotel -- Georgetown I&II Ballroom sponsored by IDtrust Members & IBM All attendees are welcome |
|
|
8:30 |
Morning Coffee |
9:00 | KMIP Technical Committee Meeting
West End Ballroom E - Washington Marriott Hotel |
IDCloud Technical Committee Meeting
West End Ballroom D - Washington Marriott Hotel |
|
PMRM Technical Committee
Meeting
Room TBA |
|
5:00 |
Technical Committee Meeting End |
|
|
8:30 |
Morning Coffee |
9:00 | KMIP Technical Committee Meeting
Dupont Salon F |
12:00 |
Technical Committee Meeting End |