soldier on his walkie talkie looking at helicopters flying by
soldier on his walkie talkie looking at helicopters flying by

Cloud, Cyber, Defense 52 MIN Watch

Enabling JADC2: How ICAM is Advancing Information Sharing

February 9th, 2023

OUR INDUSTRIES

Learn more about our work with ICAM.

In partnership with Federal News Network, GDIT’s John Sahlin recently sat down with Jay Bonci (Chief Technology Officer, Air Force), Commander Jonathan White (Cloud and Data Branch Chief, Coast Guard), Colonel Ray Gerber (Assistant Chief of Staff, G-6/G-39, Marine Corps Forces Pacific), and Drew Malloy (Technical Director, Cybersecurity and Analytics Directorate, Defense Information Systems Agency) to talk about how a range of critical federal applications, from remote sensing, to joint military communications and data sharing networks, to deployment of digital services, have at least one thing in common. Namely, they are all enabled by a well-thought-out Identity, Credential and Access Management (ICAM) system.

In the discussion you will learn more about what’s to come with ICAM and how it is being used for information sharing across networks and domains and how non-human entities will also need access to Joint All-Domain Command and Control (JADC2) and enterprise networks like it.

ICAM and Zero Trust…I view those as two sides of the same coin because there is this spectrum of managing identity and the credentials to provide access to data and services.

John Sahlin, Ph.D.

Director, Cyber Solutions, Defense