An official website of the United States government
Here's how you know
Official websites use .mil
A
.mil
website belongs to an official U.S. Department of Defense organization in the United States.
Secure .mil websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
7th Army Training Command
7th ATC
Search 7th ATC:
Search
Search
Search 7th ATC:
Search
Home
About Us
Mission
Our History
Leadership
Staff
Chaplain
G1
G2
G3
G4
G6
G8
IG
MRA
Public Affairs
Protocol
SJA
SHARP
Directorates and Commands
Combined Arms Training Center
Grafenwoehr Training Area
International Special Training Centre
Joint Multinational Readiness Center
Joint Multinational Simulation Center
Noncommissioned Officer Academy
Training Support Activity Europe
Units
Joint Multinational Training Group-Ukraine
Georgian Defense Readiness Program-Training
HHC
Environment
Competitions
Europe Best Sniper Team
USAREUR-AF International Tank Challenge
USAREUR-AF Best Squad
European Best Medic Competition
Exercises
Allied Spirit
Combined Resolve
Dynamic Front
Rapid Trident
Saber Junction
Media & News
Uebungsbetrieb
Newcomers
A to Z
Contact Us
Home
:
Media & News
:
Video
DVIDSVideoPlayer
Playlist:
Search Results
Video by Myles Scrinopskie
Player Embed Code:
Download
Embed
Share
ICAM - The Digital Enabler: Providing Authorized Users Access When and Where They Need It
Defense Intelligence Agency
Aug. 19, 2019 | 41:59
The National Security Agency (NSA) Identity Credentials and Access Management (ICAM) program’s Technical Director, Ian Stewart lead a technical discussion of the NSA’s ICAM approaches, for leveraging identities, credentials and authorizations to manage the access to data, services and resources. ICAM is foundational to ensuring the integrity of any information-sharing environment. With the evolution of virtual and cloud based technologies, data and resource sharing between man different service providers, organization and end customers, has become the standard occurrence. Consistencies between all components of the environment with identifying individuals, managing authorizations and controlling each access, is essential to protecting vital data and resources, during a breakout session of the DoDIIS Worldwide Conference, August 19, 2019, in Tampa, FL.
More
Tags
Defense Intelligence Agency
DIA
ODNI
DoDIIS19
IC CIO
IC IE
More
Up Next
59:51
IC Chief Data Officer Panel
01:18:26
DoDIIS Worldwide Conference 2019 - Day 3, Part 1
40:56
DoDIIS Worldwide Conference 2019 - Day 3, Part 2
51:25
DoDIIS Worldwide Conference Breakout Session: Cybersecurity Maturity Model Certification
35:47
DoDIIS Worldwide Conference breakout session: USSOCOM Intel and Information System Requirements for the Future
01:06:07
Make it Real: Operationalize the Architecture
01:18:18
DoDIIS Worldwide Conference 2019 - Day 2, Part 1
01:54:52
DoDIIS Worldwide Conference 2019 - Day 2, Part 2
01:01:06
Defense Intelligence Agency Chief Information Office leads panel discussion on organizational transformation
01:19:50
DoDIIS Worldwide Conference, Part 1
52:10
IC ITE Epoch 3: Advancing IT Infrastructure to Enable Key Technologies
38:33
Improving Cybersecurity for the IC Information Environment
Now Playing
ICAM - The Digital Enabler: Providing Authorized Users Access When and Where They Need It
38:44
SABLE SPEAR: Using artificial intelligence to confront the opioid crisis
58:41
Machine-Assisted Analytic Rapid-Repository SystemUpdate
More Videos