Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

One Leader’s Perspective on Identification and Access Control

By Bernard J. Scaglione
July 1, 2009

Leadership can be characterized in many ways by many different people. It can be displayed by the local Boy Scout den leader, police and fire personnel, politicians or from an enterprise CEO. Leadership can be demonstrated both in words or actions and can be the expression of one’s own ideals. These ideals can be inspirational, and can provide critical insight.
     
One key leader in the field of security expressed his ideals on the direction identification and access control should take in the future and what we as security professional must do to secure individual identity and control access in key infrastructure systems.
     
In August of 2008 Michael Chertoff, then U.S. Secretary to the Department of Homeland Security, made a speech at the University of Southern California’s National Center for Risk and Economic Analysis of Terrorism Events. In his speech, Chertoff discussed his ideals on the protection of identity. He remarked that the protection of an individual’s identity is critical to national security and the security of financial markets.     


“The Core of What We Do”

“It (identity protection) lies at the core of a great deal of what we do protecting our financial security, our personal security, and our reputational security,” said Chertoff. Of course, was referring to how the U.S. will manage and protect personal identities going into the twenty-first century. This includes thinking about how to protect identity as individuals and as a nation, how to authenticate identities, provide tamper-proof credentials and control access into secure infrastructures. Failure to properly manage our identities will damage the nation its assets, reputation and stature throughout the world.      

Chertoff stated, “The entirety of our economic livelihood in the twenty-first century is going to turn in large measure upon our ability to verify identity for those who want to transact business. And, finally, our reputation and our privacy depend on our ability to control our identity. If people can pretend to be us, if they can speak in our name in an unauthorized way, they can do great, perhaps irreversible, damage to our privacy or to our reputation; and this again, from a personal standpoint, suggests that identity is increasingly going to become the asset that we have to be most careful to protect in the twenty-first century where the ability to get information, move it around the world and store it indefinitely creates greater and greater risks to personal reputation and personal privacy.”


The Three Ds

In the future, more extensive authentication of identity is going to become a necessity. Social Security numbers, passports, driver licenses and photo IDs will not be enough. Identity authentication will rest on what Chertoff describes as the three Ds: description, device and digit. Description meaning information that is unique and known only to an individual. It could be eye color, hair color, height, weight or information like a PIN, password, username or keyword. Device which could be a card, key fob, a token, cell phone or any other electronic device that is used to substantiate a user’s identity. However, it needs to be more secure and more difficult to counterfeit then current access technology. Digit means fingerprint or some form of biometric. Something that is unique to an individual. It can be a device or piece of equipment that can capture a specific, unique piece of information about an individual.
     
As Chertoff stated in his speech, “The way forward is to work with all of these tools (the 3 Ds) in combination, to combine these together, and I can envision a time in the not-too-distant future where, in order to authenticate yourself – whether it’s for purposes of getting on an airplane, whether it’s for purposes of transacting business at a bank, whether it’s for purposes of gaining entry into a student dormitory – that you will have some kind of device; it may be electronic that will combine two or three of these three Ds, as I call them, to increase the ability to be secure in the knowledge that nobody else can duplicate your ability to identify yourself.”


Not Quite There

Chertoff’s 3-Ds approach is even functioning today, such as HSPD-12, TWIC and REAL ID programs. Although these measures are a step in the right direction, they fall short of establishing a national standard for the use of the 3-Ds in all areas of accessing sensitive networks. These programs do not provide standards for both the private and public sectors, and a standard should encompass both.
     
As leaders in the security field, it is our duty to take the lead in the development and promotion of the use of the 3-Ds in controlling access and establishing identity. The future of our nation may depend on our ability to develop and implement sound access control and identity systems within our financial and high risk infrastructures. It is time for all of us in the security field to work toward the goal of establishing workable, security identity management systems. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bernard J. Scaglione, CPP, CHPA, CHSP, is a principal partner at The Security Design Group in New York City. He has 30 years experience in the security field. Ben is Chairman of the ASIS International Healthcare Council and president of the New York City Metropolitan Healthcare Safety and Security Directors Association. He is a member of the training council for the International Association for Healthcare Security and Safety and is an accomplished author writing for ASIS, the International Association for Healthcare Security and Safety and Lawyers and Judges Publishing. He currently teaches re-certification classes for licensed architects and professional engineers at the Platt Institute in New York City.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Using Access and ID Control to Prevent Workplace Violence

    See More
  • Determining and Implementing Successful Access Control Solutions

    See More
  • Losing $2 Billion

    See More

Related Products

See More Products
  • Optimizing Social Media from a B2B Perspective

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

See More Products

Events

View AllSubmit An Event
  • September 25, 2025

    Cloud or On-Premise: Navigating Access Control and Cybersecurity Choices

    ON DEMAND: Join Schneider Electric for an in-depth webinar exploring the critical decisions security professionals face when choosing between cloud-based or on-premise access control solutions. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing