An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
75th U.S. Army Reserve Innovation Command
Make Ready!
75th U.S. Army Reserve Innovation Command
Search
Search 75th U.S. Army Reserve Innovation Command:
Search
Search 75th U.S. Army Reserve Innovation Command:
Search
Home
About
Leadership
Mission & Vision
Where We Innovate
News
MAJ Rubins Award
Talent Management
Civilian Partnerships
Innovation Support Request
Contact Us
Home
Test Page
Playlist:
Search Results
Video by Myles Scrinopskie
Player Embed Code:
Download
Embed
Share
ICAM - The Digital Enabler: Providing Authorized Users Access When and Where They Need It
Defense Intelligence Agency
Aug. 19, 2019 | 41:59
The National Security Agency (NSA) Identity Credentials and Access Management (ICAM) program’s Technical Director, Ian Stewart lead a technical discussion of the NSA’s ICAM approaches, for leveraging identities, credentials and authorizations to manage the access to data, services and resources. ICAM is foundational to ensuring the integrity of any information-sharing environment. With the evolution of virtual and cloud based technologies, data and resource sharing between man different service providers, organization and end customers, has become the standard occurrence. Consistencies between all components of the environment with identifying individuals, managing authorizations and controlling each access, is essential to protecting vital data and resources, during a breakout session of the DoDIIS Worldwide Conference, August 19, 2019, in Tampa, FL.
More
Tags
Defense Intelligence Agency
DIA
ODNI
DoDIIS19
IC CIO
IC IE
More
Up Next
59:51
IC Chief Data Officer Panel
01:06:07
Make it Real: Operationalize the Architecture
52:10
IC ITE Epoch 3: Advancing IT Infrastructure to Enable Key Technologies
38:33
Improving Cybersecurity for the IC Information Environment
Now Playing
ICAM - The Digital Enabler: Providing Authorized Users Access When and Where They Need It
01:02:10
2018 DODIIS Worldwide Conference - Day 3, Part 3
More Videos