Tech Field Day

The Independent IT Influencer Event

  • Home
    • The Futurum Group
    • FAQ
    • Staff
  • Sponsors
    • Sponsor List
      • 2026 Sponsors
      • 2025 Sponsors
      • 2024 Sponsors
      • 2023 Sponsors
      • 2022 Sponsors
    • Sponsor Tech Field Day
    • Best of Tech Field Day
    • Results and Metrics
    • Preparing Your Presentation
      • Complete Presentation Guide
      • A Classic Tech Field Day Agenda
      • Field Day Room Setup
      • Presenting to Engineers
  • Delegates
    • Delegate List
      • 2025 Delegates
      • 2024 Delegates
      • 2023 Delegates
      • 2022 Delegates
      • 2021 Delegates
      • 2020 Delegates
      • 2019 Delegates
      • 2018 Delegates
    • Become a Field Day Delegate
    • What Delegates Should Know
  • Events
    • All Events
      • Upcoming
      • Past
    • Field Day
    • Field Day Extra
    • Field Day Exclusive
    • Field Day Experience
    • Field Day Live
    • Field Day Showcase
  • Topics
    • Tech Field Day
    • Cloud Field Day
    • Mobility Field Day
    • Networking Field Day
    • Security Field Day
    • Storage Field Day
  • News
    • Coverage
    • Event News
    • Podcast
  • When autocomplete results are available use up and down arrows to review and enter to go to the desired page. Touch device users, explore by touch or with swipe gestures.
You are here: Home / Videos / Micron Device Identities on ICAM – IT Meets OT

Micron Device Identities on ICAM – IT Meets OT



Security Field Day 8


This video is part of the appearance, “Micron Presents at Security Field Day 8“. It was recorded as part of Security Field Day 8 at 8:00-10:00 on November 17, 2022.


Watch on YouTube
Watch on Vimeo

Identity, Credential and Access Management is a foundational component of building trust. Building trust starts with determining identity, and, from there, continuing to build trust with authentication and authorization. In the supply chain it also starts with identification, authentication, and authorization. Considering how products come to  market, the ability to securely communicate is based on the same principles. By having control of identity, provisioning, governance, and authorization, ICAM, as a practice, becomes the baseline for zero trust, network micro-segmentation, and data protection. This identity-based approach is already pervasive in our IT world, and will be key to enabling trusted services in the OT world.

Personnel: Chuck White

  • Bluesky
  • LinkedIn
  • Mastodon
  • RSS
  • Twitter
  • YouTube

Event Calendar

  • Oct 29-Oct 30 — AI Field Day 7
  • Nov 5-Nov 6 — Networking Field Day 39
  • Nov 11-Nov 12 — Tech Field Day at KubeCon North America 2025
  • Jan 28-Jan 29 — AI Infrastructure Field Day 4
  • Mar 11-Mar 12 — Cloud Field Day 25
  • Apr 29-Apr 30 — Security Field Day 15
  • May 6-May 8 — Mobility Field Day 14

Latest Coverage

  • HPE Bets on a “Cool-Again” Private Cloud Strategy
  • HPE at Cloud Field Day 24 – Navigating Hypervisor Uncertainty with VM Essentials & Enterprise Private Cloud
  • When “It’s Always DNS” Becomes Your Security Advantage
  • Security That Explains Itself: What the SOC Really Wants from AI
  • The Metamorphosis of Trust

Tech Field Day News

  • Exploring the Future of Enterprise AI Deployment and Innovation at AI Field Day 7
  • The Evolution of Cloud at Cloud Field Day 24

Return to top of page

Copyright © 2025 · Genesis Framework · WordPress · Log in