|
Luis Ancajas and Chuck White Presented at Security Field Day 8 |
This Presentation date is November 17, 2022 at 8:00-10:00.
Presenters: Ari Singer, Chuck White, Luis Ancajas
Follow on Twitter using the following hashtags or usernames: #XFD8
Micron Silicon Trust in the Subscription Economy
Watch on YouTube
Watch on Vimeo
Customers are no longer satisfied with static product ownership as we lean into the subscription economy. The digital transformation is forcing every industry to build products that can evolve, giving them access to dynamic revenue streams, but this introduces new manufacturing and cybersecurity gaps that are hard for most companies to deal with. Micron has built Authenta, the silicon-to-cloud trust platform that can scale across industries, cloud platforms and hardware systems — transforming the cybersecurity risks into revenue for modern brands.
Personnel: Luis Ancajas
Micron Authenta Customer Blueprints
Watch on YouTube
Watch on Vimeo
Authenta Cloud Platform customers are some of the industry’s most pioneering companies pushing forward the next generation of connected products and services at the edge. This ranges from the data centers lowering operation costs and deploying innovative business models, like Bare-Metal-as-a-Service, to the auto OEMs supporting Mobility-as-a-Service trends. All of these use cases require foundational trust layers for the secure assembly and manufacturing of final products and systems. We will walk through these customer blueprints, or use cases, and explore how customers are leveraging Authenta Cloud Platform with their solutions’ architectures to secure the edge.
Personnel: Ari Singer
Micron Device Identities on ICAM – IT Meets OT
Watch on YouTube
Watch on Vimeo
Identity, Credential and Access Management is a foundational component of building trust. Building trust starts with determining identity, and, from there, continuing to build trust with authentication and authorization. In the supply chain it also starts with identification, authentication, and authorization. Considering how products come to market, the ability to securely communicate is based on the same principles. By having control of identity, provisioning, governance, and authorization, ICAM, as a practice, becomes the baseline for zero trust, network micro-segmentation, and data protection. This identity-based approach is already pervasive in our IT world, and will be key to enabling trusted services in the OT world.
Personnel: Chuck White
Micron Secure Device Configuration Demo using Triathlon Platform
Watch on YouTube
Watch on Vimeo
One of the Achilles’ heels of the cybersecurity industry is that the establishing of trust has always been expensive, complex, and untimely. Semiconductors have a fragmentation problem, creating challenges for embedded security experts. Meanwhile, cloud platforms want to speak a single API language that is hardware agnostic. But there has been no strong ecosystem force to unify the two species. We are thus left with a DIY approach for the vast majority of products and services today. Enter the Authenta Triathlon platform. We will demonstrate how this platform enables standard JEDEC memories to unite to speak the same security language for any cloud platform, greatly simplifying and securing the device lifecycle from design to deployment of services.
Personnel: Ari Singer