|
This video is part of the appearance, “Micron Presents at Security Field Day 8“. It was recorded as part of Security Field Day 8 at 8:00-10:00 on November 17, 2022.
Watch on YouTube
Watch on Vimeo
Identity, Credential and Access Management is a foundational component of building trust. Building trust starts with determining identity, and, from there, continuing to build trust with authentication and authorization. In the supply chain it also starts with identification, authentication, and authorization. Considering how products come to market, the ability to securely communicate is based on the same principles. By having control of identity, provisioning, governance, and authorization, ICAM, as a practice, becomes the baseline for zero trust, network micro-segmentation, and data protection. This identity-based approach is already pervasive in our IT world, and will be key to enabling trusted services in the OT world.
Personnel: Chuck White