IDESG Newsletter #11
Table of Contents
5th Plenary Meeting Agenda
July 24-26, 2013
MIT Media Lab - 75 Amherst St Cambridge, MA 02139
Special Thanks to our Sponsors
Thursday, July 25 - Remote Access Information and Room Numbers
Friday, July 26 - Remote Access Information and Room Numbers
New to the IDESG or Want to Learn More?
Attend the IDESG-NSTIC Orientation Session
Wednesday, July 24 2013
10:00-12:00 p.m. ET
Phone: 1-800-250-2600 PIN: 64386817#
Screen Share: http://bit.ly/17ZHFqH
Joining the Plenary Meeting Remotely?
Contact email@example.com with any questions.
Plenary Meeting Highlights
Taxonomy Ad-Hoc Group Report - Thursday 1:30 pm ET
The Taxonomy Ad-Hoc Group (AHG) was tasked by the IDESG Standards and Security Committees to develop an IDESG glossary of terms to enable these committees to effectively complete their work via common and well understood key definitions. This glossary may be used for all internal activities as well as IDESG definitions for external interactions. This presentation will provide a brief overview of the activities of the Taxonomy Ad-Hoc Working Group including their objectives, the approach that they have used to perform their work, the status of their work - the definitions that they have completed, their next steps - the sets of terms that they are going to be working on, and a proposal for the plenary on an adoption process and how to use the terms.
Use Case Criteria and Life Cycle Update -
Thursday 2:15 pm ET
At the May plenary, a Use Case Workshop was held. You may be wondering what has been happening with the use case effort since then. This presentation will fill you in on the status and plans of the Use Case AHG and overall use case development effort. Additionally, a proposed "Use Case Life Cycle" will be presented, along with a re-visit of the draft use case criteria, with an explanation of how these are intended to be used, and plans for a formal review and comment period.
Policy Coordination Committee Report - Thursday 2:35 pm ET
As was briefly mentioned in the last plenary meeting, the Policy Coordination Committee has moved forward on an initiative to gather perspectives from current and prospective member companies about what policy incentives might provide sufficient value for them to join and remain active as an IDESG member. Committee Chair Dan Chenok will summarize this activity and take questions. He will be joined by Jeremy Grant who will discuss the government's interest in the information.
MIT Media Lab Tour - Thursday 12:00-1:30 pm ET
A tour will be offered of the media lab during Thursday's lunch break between 12:00-1:30. True to the vision of its founders, the MIT Media Lab focuses on the study, invention, and creative use of digital technologies to enhance the ways that people think, express, and communicate ideas, and explore new scientific frontiers. For more information about the Media Lab, visit http://www.media.mit.edu/.
Happy Hour - Wednesday 6:00 pm ET
All IDESG Plenary attendees are invited to join us at a Happy Hour event sponsored by User-Centric ID Live. The Happy Hour will begin at 6:00 p.m. at John Harvard's Brewery & Ale House, located at 33 Dunster St. Cambridge, MA.
Study Indicates that an NSTIC-Aligned
Identity Management System
Could Save the IRS up to $305 Million
The National Strategy for Trusted Identities in Cyberspace (NSTIC) envisions an "Identity Ecosystem" in which organizations and individuals may leverage trusted identities for access to services on the Internet. Shifting the paradigm of each organization deploying and maintaining its own stove-piped user account management system, organizations may instead deploy solutions that accept trusted credentials issued by 3rd parties, resulting in significant time and cost savings. A key component of the NSTIC mission is to advance this vision in U.S. government.
The U.S. government, like any large organization, is increasingly looking to deploy services online to both improve customer service and reduce costs. High risk or sensitive services require that government web sites verify the identity of the individual or organization accessing the service while ensuring the transaction remains private and is secure. Traditionally, this was achieved by deploying proprietary solutions on an agency-by-agency basis, with a predictable duplication of effort across government at significant additional cost to the taxpayer. Read More
ATTENTION COMMITTEES! Update the entire IDESG on your progress in the next newsletter by emailing firstname.lastname@example.org.