
Sign up to save your podcasts
Or
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/
Want to listen to other episodes? www.Federaltechpodcast.com
For many, IDEMIA is a relatively unknown company that was recently awarded a 10-year Blanket Purchase Agreement from GSA. The focus is on next-generation identity proofing for login.gov.
At first glance, you might say “IDEMIA” is an overnight success. Upon further examination, you will discover that IDEMIA has served federal agencies for over 60 years.
During the interview, Donnie Scott gives listeners a complete rundown on the variations on identity, identity proofing, identity management, and identity access management.
He reinforces that rigorous identity-proofing can reduce waste, fraud, and abuse of federal systems.
This is becoming a more complex problem. For example, technology enthusiasts are experimenting with so-called “agents” to access data, assemble it, and then attempt to draw conclusions.
At each step along the way, there are gateways to verify the validity of the person (or non-human entity) requesting data.
This interview offers a great perspective from a well-respected company that provides identity proofing to the federal government.
5
55 ratings
Connect to John Gilroy on LinkedIn https://www.linkedin.com/in/john-gilroy/
Want to listen to other episodes? www.Federaltechpodcast.com
For many, IDEMIA is a relatively unknown company that was recently awarded a 10-year Blanket Purchase Agreement from GSA. The focus is on next-generation identity proofing for login.gov.
At first glance, you might say “IDEMIA” is an overnight success. Upon further examination, you will discover that IDEMIA has served federal agencies for over 60 years.
During the interview, Donnie Scott gives listeners a complete rundown on the variations on identity, identity proofing, identity management, and identity access management.
He reinforces that rigorous identity-proofing can reduce waste, fraud, and abuse of federal systems.
This is becoming a more complex problem. For example, technology enthusiasts are experimenting with so-called “agents” to access data, assemble it, and then attempt to draw conclusions.
At each step along the way, there are gateways to verify the validity of the person (or non-human entity) requesting data.
This interview offers a great perspective from a well-respected company that provides identity proofing to the federal government.
111,191 Listeners
7,777 Listeners
28,411 Listeners
33 Listeners
420 Listeners