Download PDF version Contact company
The Identity, Credential, and Access Management (ICAM) architecture provides organisations with a consolidated approach for implementing initiatives
Ron Martin will present Maturity Model for Identity, Credentialing and Access Management

Ron Martin, CPP, Executive Director, Open Security Exchange will be a featured speaker at GovSec – the Government Security Conference & Expo featuring the U.S. Law Enforcement Conference & Expo. He will be presenting Maturity Model for Identity, Credentialing and Access Management at 3:15 pm on Tuesday, April 3, 2012.

The Identity, Credential, and Access Management (ICAM) architecture provides organisations with a consolidated approach for implementing initiatives. The use of enterprise architecture techniques helped ensure alignment, clarity, and interoperability across organisations. Now that the ICAM Roadmap 2.0 is finalised, organisations will need to assess conformance. The ICAM Maturity Model is a tool that provides a detailed way to evaluate the progress of an organisation’s business processes and technical capabilities against the ICAM target state.

GovSec, which takes place April 2-4 at the Walter E. Washington Convention Center in Washington, D.C., provides attendees with the opportunity to hear from experts in law enforcement, physical security and cybersecurity during free keynote addresses and 36 conference sessions. The event also includes a free Expo, which can be attended at no cost for qualified individuals, where industry leading vendors will showcase new tools and technologies. The EXPO also features additional free educational programming, including a series of Featured Presentations, delivered by professional organisations in the government security and law enforcement communities, which offer career development in a number of competencies and Agency Briefings, where attendees can learn about homeland security and law enforcement programs they can use in their agencies and departments.

This year, as an added bonus, GovSec attendees also will be able to attend sessions at two co-located conferences: the Contingency Planning & Management Conference and Expo and the Network-Centric Security Conference and Exposition.

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 security
Comprehensive K12 security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing the right fingerprint capture technology
Choosing the right fingerprint capture technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How do new security technologies transform retail and loss prevention?
How do new security technologies transform retail and loss prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...