Identity and Access Management for Micron Devices - Bridging IT and OT Security
Earn Your Business Degree, Tuition-Free, 100% Online!
Finance Certifications Goldman Sachs & Amazon Teams Trust
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Watch a 32-minute conference talk from Security Field Day exploring how Identity, Credential and Access Management (ICAM) serves as a cornerstone for building trust in both IT and OT environments. Delve into how trust is established through identification, authentication, and authorization processes across supply chains and product development. Learn how ICAM practices form the foundation for zero trust architecture, network micro-segmentation, and data protection strategies. Discover why identity-based approaches that are standard in IT will be crucial for enabling trusted services in operational technology. Presented by Fornetix CTO Chuck White at Security Field Day 8 in Santa Clara, this technical discussion bridges the gap between information technology and operational technology security frameworks.
Syllabus
Micron Device Identities on ICAM – IT Meets OT
Taught by
Tech Field Day