Return to Homepage


Home   |   Site Map   |   Privacy   |   Contact Us   |   RSS YouTube Twitter Linked In Facebook NASCIO Community
committees
Email This Page     |     Print This Page     |    
Comments?     |     Share This Link

COMMITTEES   |   State Digital Identity Working Group

About the Working Group

Issue Statement: Federal, state, local, and tribal governments currently issue numerous credentials to constituents for access to facilities or services based on a variety of endorsements. Many of the endorsements provide citizens with access to federally funded programs, but the issuance of credentials remains program-specific and has become a redundant process for many agencies and departments. By issuing a digital identity that has multi-platform credentialing options, it will result in improved efficiency and convenience for both users and issuers. To the extent such credential is honored by commercial entities, it will also improve efficiency and security of commercial transactions, including on-line transactions.

In an effort to lower the amount of data breaches and curtail identity theft, effective policies must enable trust across organizational, operational, physical, and network boundaries. The resulting framework will promote data security, privacy, and the high assurance authentication needed to secure information sharing and transparency in government. Guidance on the approach to identity management will encourage a shift away from stove-piped applications to an enterprise view of identity that enables use without creating redundant sources that are difficult to protect and keep current.

Purpose: The State Digital Identity Work Group will provide a consensus based forum that enables State Chief Information Officers (CIOs), Chief Information Security Officers (CISOs), Enterprise Architects and line of business stakeholders to collaborate on developing recommendations on federated identity management initiatives. This working group intends to provide a framework for the key guidelines for program management and collaboration. The charter seeks to develop solutions for a sustainable and supportable model for use in identity, credentialing, and access efforts.

Goals and Objectives:

  • Promote the use of an enterprise architecture governance structure
  • Distinguish appropriate capabilities for identifying, authenticating, and authorizing individuals appropriate access to resources
  • Enable trust and interoperability
  • Improve security and privacy
  • Facilitate e-government use by facilitating secure access to services and transactions
  • Increase efficiencies and reduce costs
  • Facilitate efficiency and security of commercial transactions
  • Seek to find ways to expand convenience of services while improving security and privacy
  • Investigate the short-term and long-term sustainability of a state digital identity program

Committee Roster

Co-Chair:
Peter Hastings, State of New Hampshire
  Co-Chair:
Calvin Rhodes, State of Georgia

George Allen, MorphoTrust
Daniel Arnold, Commonwealth of Kentucky
Erik Avakian, Commonwealth of Pennsylvania
David Ballard, CenturyLink
Glen Bellomy, Symantec
Michael Berman, Datacard
John Biccum, Microsoft
Deborah Blanchard, Verizon
Claudia Boldman, Commonwealth of Massachusetts
Renee Brand, Oracle USA Inc.
Scott Bream, State of Washington
Chris Buse, State of Minnesota
Tom Calvert, Intel
Paul Cartland, State of Alaska
Steve Casey, State of Connecticut
Charles Cephas, Symantec
Victor Chakravarty, State of Maine
Patti Chapman, Commonwealth of Pennsylvania
Mr. Paul Christman, Quest Software
Glen Coleman, State of Ohio
Greg Coleman, Harris Corporation
Nancy Collins, Xerox
Todd Crosby, State of Hawai'i
Sam Curry, EMC Corporation
Denise Cushaney, CDW-G
Stu Davis, State of Ohio
Justin Dew, ActivIdentity
Mark DiFraia, MorphoTrust
Chris Dixon, Deltek
Kevin M Doty, HP
Andre Eaddy, Unisys
Scot R Ellsworth, State of Michigan
Julie Evans, Center for Internet Security
Lane Feingold, Motorola Solutions
Angela Fultz Nordstrom, NIC
Amit Gandre, Deloitte Consulting LLP
Chris Gardner, SecureKey Technologies
Mr. Scott Glover, Deloitte Consulting LLP
Chad Grant, NASCIO
Brad Hanscom, BerryDunn
Tim Hanson, State of Minnesota
Mitch Herckis, NASCIO
Karyn Higa-Smith, US Department of Homeland Security
John Hogan, IBM
Daniel Hudson, Datacard
Randy Hultman, State of Delaware
Judy Keator, HP
Rodney I Kimura, State of Hawai'i
Agnes Kirk, State of Washington
  Peter Kirkwood, MorphoTrust
Sriram Krishnan, Good Technology
David N Kroening, State of New York
Paul Laurent, Oracle USA Inc.
Sue Ann Lipinski, State of West Virginia
Thomas Lockwood, Professional & Executive Services, LLC
Daniel J Lohrmann, State of Michigan
William MacLafferty, State of Georgia
Mike Malik, State of Delaware
Sanjay Menon, Accenture
Dennis W Miller, State of Oregon
Krishna Mohan, Commonwealth of Kentucky
Hope Morgan, State of Texas
Frank Morrow, Commonwealth of Pennsylvania
Mr. Robert A Myles, Symantec
Matthew Neuman, Giesecke & Devrient
Cathy Novak, Pegasystems Inc.
Dr. Craig P Orgeron, PhD, State of Mississippi
Mr. Stephan Papadopulos, District of Columbia
Kym Patterson, State of Arkansas
Brendan M Peter, CA Technologies
Zeca Pires, Datacard
Andy Pitman, Microsoft
Danka Prilepkova, State of Delaware
Mark Reardon, State of Georgia
Mr. Richard Reasner, State of Michigan
Jennifer Reed, IBM
James A Richards, III, State of West Virginia
Doug Robinson, NASCIO
Tim Robyn, State of Missouri
Mr. Juan E Rodriguez de Hostos, Commonwealth of Puerto Rico
Michael Roling, State of Missouri
Renault Ross, Symantec
Jim Salb, State of Delaware
John Santisteban, ActivIdentity
Dan Schutzer, Financial Services Roundtable
Eric Simon, HP
Geoffrey Slagle, American Association of Motor Vehicle Administrators
Jamie Snedaker, MorphoTrust
Chris Stanley, State of New York
Dave Strazzeri, State of New York
Srini Subramanian, Deloitte Consulting LLP
Kathleen Synstegaard, Datacard
Lisa Thompson, NASCIO
Meredith Ward, NASCIO
Samantha Wenger, NASCIO
David Williams, State of West Virginia
Mike Wyatt, Deloitte Consulting LLP

Links

.

Leveraging Enterprise Architecture for Improved IT Procurement Cloud Computing Series Capitals in the Clouds Part IV – Cloud Security: On Mission and Means