Public Sector Identity Governance Strategist; SailPoint
Frank Briguglio is a recognized thought leader and authority in Identity Governance, Administration (IGA), and Authentication & Access Controls. Throughout his career he has been involved in the design and implementation of identity-centric technologies and the development of identity standards. He has supported the Federal Identity, Credential and Access Management Subcommittee (FICAM) as a Subject Matter Expert and was involved in the development of the FICAM Roadmap; the Federal and DoD Public Key Infrastructure (PKI) and Federated Identity Standards adopted by FICAM E-Authentication program.
Frank has over 20 years’ experience supporting Federal Civilian, Department of Defense, and the Intelligence community. He has worked for industry leaders in the Security, Identity and Access Management space at Oracle, Microsoft, Netscape, Sun Microsystems and Deloitte and is currently the Public Sector Identity Governance Strategist at SailPoint.
Prior to his career in Enterprise Security and Identity Management he served in the United States Navy as a Cryptologist.
Thursday, June 27
4:25 - 4:50 pm Monroe
Securing the Nation’s most Sensitive Assets How do Identity Governance and Access Management provide protections for federal civilian systems and data? The federal civilian government is one of the largest enterprises in the world and protecting that enterprise is a monumental task. Since 2012 the Continuous Diagnostics and Mitigation (CDM) Program at the Department of Homeland Security has been assisting agencies across the entire federal civilian government by providing tools and sensors, services and dashboards that help agencies employees and executives to reduce risk. The government understands that Identity, Credential and Access Management (ICAM) is essential to this effort and has long been a leader in providing assured credentials for employees and contractors accessing federal networks. With the advent of mobile devices and the increasing prevalence of the use of cloud services the perimeter that requires protection is defined by the identity of the user.
In this presentation we will present how CDM has been and continues to be one of the main programs that government has for protecting federal systems and data, how the program addresses ICAM needs across the government, and how those needs become more reliant on Identity as the use of cloud services and mobile devices increase.
Enter your details to receive email updates from Identiverse