The Evolution of Credentials and their Use in the IT, OT, and Physical Security Environment

The Evolution of Credentials and their Use in the IT, OT, and Physical Security Environment

April 11, 2018, 11:00 AM - 12:00 PM

Sands 305 Level 1


Access management has always been a rudimentary process driven by controlling people with processes to managing security and access to critical and non-critical infrastructure. However, access control is now used for virtually every area of our world. Unfortunately, granted (or denied) access is a very one-dimensional concept since it relies primarily on a physical card, password, biometric reader, or using a two or three-part authentication process. Today, the goal is not simply to use a method to detect and verify access, it’s more a question of credential and the evolution of the credential as you. The primary challenges revolve around privacy and the process of storing and retrieving your credentials. The goal for this session is to define what a credential is and how can it be applied to virtually every area of our lives. From access to buildings, facilities, and many other areas we see that IT, OT, Physical Security is relying on credentials to improve safety, security, and business process.

Learning Outcomes:
1. Determine what is a credential is and why is it not the same as Access Control.
2. Review how Access control has been used in IT, OT, and Physical Security traditionally.
3. Outline the first steps to defining how to create security around credentials.


  1. Show SIA Education@ISC


  1. Track
    Connected Security People & Process

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.