Tech Field Day

The Independent IT Influencer Event

  • Home
    • Gestalt IT
    • About Tech Field Day
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
    • Sponsor Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
You are here: Home / Appearances / Micron Presents at Security Field Day 8

Micron Presents at Security Field Day 8



Security Field Day 8

Luis Ancajas and Chuck White Presented at Security Field Day 8


This Presentation date is November 17, 2022 at 8:00-10:00.

Presenters: Ari Singer, Chuck White, Luis Ancajas


Follow on Twitter using the following hashtags or usernames: #XFD8


Micron Silicon Trust in the Subscription Economy


Watch on YouTube
Watch on Vimeo

Customers are no longer satisfied with static product ownership as we lean into the subscription economy. The digital transformation is forcing every industry to build products that can evolve, giving them access to dynamic revenue streams, but this introduces new manufacturing and cybersecurity gaps that are hard for most companies to deal with. Micron has built Authenta, the silicon-to-cloud trust platform that can scale across industries, cloud platforms and hardware systems — transforming the cybersecurity risks into revenue for modern brands.

Personnel: Luis Ancajas

Micron Authenta Customer Blueprints


Watch on YouTube
Watch on Vimeo

Authenta Cloud Platform customers are some of the industry’s most pioneering companies pushing forward the next generation of connected products and services at the edge. This ranges from the data centers lowering operation costs and deploying innovative business models, like Bare-Metal-as-a-Service, to the auto OEMs supporting Mobility-as-a-Service trends. All of these use cases require foundational trust layers for the secure assembly and manufacturing of final products and systems. We will walk through these customer blueprints, or use cases, and explore how customers are leveraging Authenta Cloud Platform with their solutions’ architectures to secure the edge.

Personnel: Ari Singer

Micron Device Identities on ICAM – IT Meets OT


Watch on YouTube
Watch on Vimeo

Identity, Credential and Access Management is a foundational component of building trust. Building trust starts with determining identity, and, from there, continuing to build trust with authentication and authorization. In the supply chain it also starts with identification, authentication, and authorization. Considering how products come to  market, the ability to securely communicate is based on the same principles. By having control of identity, provisioning, governance, and authorization, ICAM, as a practice, becomes the baseline for zero trust, network micro-segmentation, and data protection. This identity-based approach is already pervasive in our IT world, and will be key to enabling trusted services in the OT world.

Personnel: Chuck White

Micron Secure Device Configuration Demo using Triathlon Platform


Watch on YouTube
Watch on Vimeo

One of the Achilles’ heels of the cybersecurity industry is that the establishing of trust has always been expensive, complex, and untimely. Semiconductors have a fragmentation problem, creating challenges for embedded security experts. Meanwhile, cloud platforms want to speak a single API language that is hardware agnostic. But there has been no strong ecosystem force to unify the two species. We are thus left with a DIY approach for the vast majority of products and services today. Enter the Authenta Triathlon platform. We will demonstrate how this platform enables standard JEDEC memories to unite to speak the same security language for any cloud platform, greatly simplifying and securing the device lifecycle from design to deployment of services.

Personnel: Ari Singer


  • Facebook
  • Instagram
  • LinkedIn
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Oct 4-5 — Edge Field Day 2
  • Oct 18-19 — Cloud Field Day 18
  • Oct 25-26 — Networking Field Day 33
  • Nov 8-9 — Security Field Day 10
  • Nov 15-16 — Mobility Field Day 10

Latest Links

Modernizing Aging Legacy Systems Without Cost Creep With AMD

TFDx With AMD: More Than Just a Bag of Chips! (Part2)

Rout Intruders With All New VMware NSX+ Network Detection and Response Service

VMware Explore 2023

Adopting a Standard Operating Format in Multi-Cloud With VMware NSX+

Recent Videos

Meeting the Demands of the Modern Datacenter with AMD

VMware Presents at Tech Field Day Extra at VMware Explore

Trends in Storage and Data - New Directions for SNIA

Sustainability Means More Than Just Power Consumption

Watch Tech Field Day on YouTube

Best of Tech Field Day

802.11ac: The next generation of Wi-Fi with Mark Denny at Wireless Field Day 3

What is an Ethernet Fabric?

Carter George presents Ocarina Networks capacity optimization in 2009 at TFD1

Cisco 5 - Network Troubleshooting with Wireshark and Mediatrace with Nikhil Sharma

Watch Tech Field Day on YouTube

Return to top of page

Copyright © 2023 · Genesis Framework · WordPress · Log in