Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2026 Sponsors
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2026 Delegates
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Videos / Micron Device Identities on ICAM – IT Meets OT

Micron Device Identities on ICAM – IT Meets OT



Security Field Day 8


This video is part of the appearance, “Micron Presents at Security Field Day 8“. It was recorded as part of Security Field Day 8 at 8:00-10:00 on November 17, 2022.


Watch on YouTube
Watch on Vimeo

Identity, Credential and Access Management is a foundational component of building trust. Building trust starts with determining identity, and, from there, continuing to build trust with authentication and authorization. In the supply chain it also starts with identification, authentication, and authorization. Considering how products come to  market, the ability to securely communicate is based on the same principles. By having control of identity, provisioning, governance, and authorization, ICAM, as a practice, becomes the baseline for zero trust, network micro-segmentation, and data protection. This identity-based approach is already pervasive in our IT world, and will be key to enabling trusted services in the OT world.

Personnel: Chuck White

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Mar 11-Mar 12 — Cloud Field Day 25
  • Mar 23-Mar 24 — Tech Field Day Extra at RSAC 2026
  • Apr 8-Apr 10 — Networking Field Day 40
  • Apr 13-Apr 15 — Tech Field Day Experience at Qlik Connect 2026
  • Apr 29-Apr 30 — Security Field Day 15
  • May 6-May 8 — Mobility Field Day 14
  • May 13-May 14 — AI Field Day 8
  • Jun 2-Jun 3 — Tech Field Day Extra at Cisco Live US 2026

Latest Coverage

  • When Regulators Can’t Agree, Your Data Infrastructure Has to Carry the Weight
  • AI Guesses, Math Proves: Forward Networks Brings Deterministic Truth to AI Infrastructure Governance
  • When Storage Stops Being a Location
  • Qlik Answers, SpaceX vs Amazon, & Practical Quantum | Tech Field Day News Rundown: March 11, 2026
  • Preparing for CloudFieldDay 25

Tech Field Day News

  • Cloud Strategy, The Future of Infrastructure, and Of Course AI at Cloud Field Day 25
  • Cutting-Edge AI Networking and Storage Kick Off 2026 at AI Infrastructure Field Day 4

Return to top of page

Copyright © 2026 · Genesis Framework · WordPress · Log in