In partnership with Federal News Network, GDIT’s John Sahlin recently sat down with Jay Bonci (Chief Technology Officer, Air Force), Commander Jonathan White (Cloud and Data Branch Chief, Coast Guard), Colonel Ray Gerber (Assistant Chief of Staff, G-6/G-39, Marine Corps Forces Pacific), and Drew Malloy (Technical Director, Cybersecurity and Analytics Directorate, Defense Information Systems Agency) to talk about how a range of critical federal applications, from remote sensing, to joint military communications and data sharing networks, to deployment of digital services, have at least one thing in common. Namely, they are all enabled by a well-thought-out Identity, Credential and Access Management (ICAM) system.
In the discussion you will learn more about what’s to come with ICAM and how it is being used for information sharing across networks and domains and how non-human entities will also need access to Joint All-Domain Command and Control (JADC2) and enterprise networks like it.
“ICAM and Zero Trust…I view those as two sides of the same coin because there is this spectrum of managing identity and the credentials to provide access to data and services.”
John Sahlin, Ph.D.
Director, Cyber Solutions, Defense
Subscribe to our newsletter. Get thought leadership delivered straight to your inbox.