An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Defense Intelligence Agency
COMMITTED TO EXCELLENCE IN DEFENSE OF THE NATION
Defense Intelligence Agency
Search
Search DIA:
Search
Search DIA:
Search
Facilities Operating Status
Employee Resources
Home
About
History
Museum
George Washington Letters
Directors of DIA
The Historians
Organization
Locations
Missile and Space Intelligence Center
Joint Military Attache School
Equal Opportunity
Open Source Intelligence
PrePublication
Contact Us
News & Features
Articles
Press Releases
Videos
DIA in the News
Threat Reports
Photo Gallery
No FEAR
Podcasts
Careers
Career Fields
Analysis
Counterintelligence
Finance & Acquisition
Human Intelligence
Human Services
Information Technology
Inspector General
Legal
Mission Management
Office Management & Infrastructure
Science & Technology
Security
Search Vacancies
Apply to DIA
Hiring Process
Internships
Veteran Programs
Business
SIA3
NeedipeDIA
Office of Small Business Programs
VIDEOS
HOME
/
NEWS & FEATURES
/ VIDEOS
Playlist:
Search Results
#DGOVLIVE
DIA
Defense Intelligence Agency
DEFENSE ON DEMAND
DGOV
Video by Myles Scrinopskie
Player Embed Code:
Download
Embed
Share
ICAM - The Digital Enabler: Providing Authorized Users Access When and Where They Need It
Defense Intelligence Agency
Aug. 19, 2019 | 41:59
The National Security Agency (NSA) Identity Credentials and Access Management (ICAM) program’s Technical Director, Ian Stewart lead a technical discussion of the NSA’s ICAM approaches, for leveraging identities, credentials and authorizations to manage the access to data, services and resources. ICAM is foundational to ensuring the integrity of any information-sharing environment. With the evolution of virtual and cloud based technologies, data and resource sharing between man different service providers, organization and end customers, has become the standard occurrence. Consistencies between all components of the environment with identifying individuals, managing authorizations and controlling each access, is essential to protecting vital data and resources, during a breakout session of the DoDIIS Worldwide Conference, August 19, 2019, in Tampa, FL.
More
Tags
Defense Intelligence Agency
DIA
ODNI
DoDIIS19
IC CIO
IC IE
More
Up Next
59:51
IC Chief Data Officer Panel
01:06:07
Make it Real: Operationalize the Architecture
Now Playing
ICAM - The Digital Enabler: Providing Authorized Users Access When and Where They Need It
38:33
Improving Cybersecurity for the IC Information Environment
52:10
IC ITE Epoch 3: Advancing IT Infrastructure to Enable Key Technologies
01:02:10
2018 DODIIS Worldwide Conference - Day 3, Part 3
More Videos