Embracing Technology for Improved Identity Access Management
govciooutlookapac

Embracing Technology for Improved Identity Access Management

Adam McBride, HHS HSPD-12 IT Program Manager, U.S. Department of Health and Human Services

Adam McBride, HHS HSPD-12 IT Program Manager, U.S. Department of Health and Human Services

Adam McBride works with multiple stakeholders across the U.S. Department of Health and Human Services (HHS) to enable strong identity access management (IAM) controls for its applications. With years of experience working with security systems, McBride makes IAM seamless and is always prepared to overcome any challenge that comes with his line of work.

In an interview with Govt CIO Outlook, Adam McBride talks about the importance of IAM and the need for improved data security in the field.

What are some of your roles and responsibilities as the senior IT program manager at HHS?

I work in the HHS Program Support Center and oversee IT programs like IAM and HSPD-12. We provide shared services for HHS. I mostly work with internal and external identity access, and we try to build and improve new and existing projects in the system. We also carry out a federated government identity approach to prevent fraud.

What major challenges does the department face today, and how do you deal with them?

Post-pandemic, we embraced a hybrid model of working, and carrying out the office procedures remotely had been quite challenging. As we are actively hiring, the recruitment process has become complicated, with candidates finding it difficult to travel and limited available in-processing sites for new staff to go to in person. We are currently working on several projects to deal with this issue. One particular project that we look forward to is establishing remote onboarding kiosks. These kiosks will also help us with onboarding through Supervised Remote In-Person (SRIP) processing. These kiosks will be established in three locations, starting with two in Washington, D.C., and one in Atlanta, GA. The entire verification process can be carried out by following the instructions on the machines and assistance from the SRIP Agent. The kiosks will scan the candidate's required documents and fingerprints and also capture the candidate's picture. Once it is complete, the encrypted data packet is sent to our enrollment system for processing. The information sent to our enrollment system will be ready for background checks and further employee in-processing. Once the checks come back clear, the individual will be able to obtain their credentials, whether it is a PIV card or PKI hard token.

“The public needs to understand that by identity proofing, we’re trying to make sure that your data is safe and you are who you say you are.”  

What are the technological trends that you see impacting the public sector?

The mobile driver’s license (mDL) is a game changer in HHS and other government agencies. We are looking to allow the public to access certain government benefits or information with the use of mDL. It is convenient for the public to use an identity proofing process that they have already completed by getting their Real ID state-issued mDL. Multi-factor authentication is a feature that could be added, which the service providers can quickly do.

What would be your advice to the budding professionals in the public sector?

Make sure that you always do the right thing and check everything. For instance, many vendors out there could provide the technology systems that the government needs. You might think that a system will meet your needs when you see it, but most of the time, they oversell and under-deliver it. You need to be aware of the priorities and not make decisions just because it seems good.

What, according to you, is important for the public to understand about identity proofing?

There is a misconception that the government is trying to steal people’s data. The public needs to understand that by identity proofing, we’re trying to make sure that your data is safe and you are who you say you are. Better marketing tactics should be employed to bring more clarity about identity proofing and to remove the public’s apprehensions about using Identity systems.

Weekly Brief

ON THE DECK

Read Also

Creating Resilient Security Ecosystems for Smart Cities

Christopher Harper, Security Manager, City of Reno

Crafting A Secure And Inclusive Digital Future

Tom Kureczka, Chief Information Officer, City of Winston-Salem

When Technology Meets Human-Centered Leadership

Kevin Wilkins, Chief Information Officer, City Of Fort Collins

Finding a Path to Practical and Successful Data Governance

Bojan Duric, Chief Data Officer, City of Virginia Beach

Who We Are and What We Do

Nicholas Thorpe, Director of Emergency Management, Franklin County

Embracing Technology in the Government Sector

Kevin Gilbertson, Chief Information Officer, State of Montana