Acting Director, Federal Identity, Credential and Access Management (FICAM) Program Office
GSA (Pending Agency Approval)
The sprawl of enterprise computing has made obsolete the concept of perimeter security, long considered the foundation of digital defense. The new perimeter is pixelated, comprising millions of users equipped with mobile devices accessing data and services in the cloud. To bring order to this new frontier, enterprises are relying on Identity, Credential, and Access Management (ICAM) to establish security at the source. This session will delve into specific ways that ICAM can deliver security.