InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Achieving US Government Mandates with Operational Efficiency

Presented by

Bassam Al-Khalidi, Axiad Co-founder and CIO with guest Teresa Wu, VP Smart Credentials & Access IDEMIA

About this talk

Federal regulations, such as DAFMAN 17-1304, DoDI 8500.01, OMB M-22-09, and Executive Order 14028, are reshaping how identity, credential, and access management (ICAM) must be implemented across defense and civilian agencies. The directives, anchored in Zero Trust principles, require not only technical compliance but also measurable operational outcomes and commercial-first procurement. In this webinar, you’ll gain valuable insight on: • Enabling phishing-resistant authentication across your agency • Securing interim phishing-resistant credentials for those not eligible for or waiting for PIV cards • Modernizing ICAM in alignment with DoDI 8520.04, DAFMAN 17-1304, and local innovation efforts such as the Phoenix Spark Initiative • Reducing friction and delays associated with current CAC issuance Join Axiad and IDEMIA in a tactical and operational discussion—focused on actionable steps that accelerate compliance, improve efficiency, and strengthen agency cybersecurity posture.
Axiad

Axiad

2221 subscribers28 talks
Trusted Identity. At the speed of now.
Identity teams are drowning in complexity with fragmented tools, siloed data, blind spots, and manual processes. This chaos exposes organizations to breaches, ransomware, data theft, compliance failures, and budget overruns. Axiad tames the human and NHI chaos by automating visibility, intelligence, risk remediation, and lifecycle management. The result is a drastic acceleration of operational efficiency. —Eliminate thousands of work hours from manual processes, —Prioritize resources to make the most impact, —Reduce the risk of breach and the financial implications that come with it
Related topics