Oracle Security for Mobile

Wednesday, May 15, 2013
8:30 AM – 12:00 PM
Suite 1&2 , Level 7,
Hilton, 3 Jalan Stesen Sentral,
Kuala Lumpur, 50470, Malaysia
In Person
Space is limited. Register today!
Overview Agenda

Defining Your Mobile Identity Management Strategy

While 90% of organization will deploy mobile applications to their end users, 76% of these applications today store the credential on the device and 10% of these store passwords in plain text. If you are planning to deploy and support mobile applications for your end users or customers, then you will need a security strategy.

With many devices and many operating systems, this can be a challenge. The next device on your network will be an employee owned device not tested by your IT department.

As users connect from multiple devices with multiple applications, a policy driven approach can reduce cost and risk.

Join us for this event and you will learn:

  • How a security inside-out strategy will provide a more cost effective way to secure mobile access.
  • How to apply emerging Mobile Identity Management standards to secure mobile applications.
  • How to apply the results of a recent SANS study to develop a mobile access policy and reduce risk.
Don't miss this chance to network with your peers, share your ideas and speak with Oracle experts about how to extend your Identity Management infrastructure and policies to secure mobile applications.

For more information, please contact marketing_my@oracle.com Or +6 03 9286 2158

Time

Topic

8:30 a.m.

Registration and Breakfast

9:30 a.m.

Keynote: Mobile Security Begins Inside
With over 5.9 billion mobile devices world wide, IT organizations have to re-think they way security is delivered for mobile platforms. With mobile security, complexity is the enemy of scale. Multiple devices, mobile operating systems and applications require a standards based approach that can extend enterprise security "inside out". In this session we will discuss how a security inside our approach can provide a more cost effective way to secure mobile applications

10:15 a.m.

Session 1: Demystifying Mobile Identity Management & Standards
Creating a mobile device strategy can be a challenge for many organizations because the standards and best practices are constantly changing. In this session we will provide a primer on mobile Identity Management and the standards emerging for securing mobile applications. We will demystify the capabilities of the standard and provide some real world examples of how these standards are being utilized.

11:00 a.m.

Break

11:15 a.m.

Session 2: SANS Institute Mobility Security Survey Results and discussion
This session, we will share more of the result findings from the survey conducted by SANS Institute on Mobility Policy and Management with over 650 respondents weighed in on topics and trends such as BYOD risk and security policies and overall risk management programs. You will hear also more about how these companies are integrating BYOD security in their risk management programs, critical risk factors impacting an organization’s Mobility policy and steps you can take today to securely integrate the BYOD program

12:00 p.m.

Closing



If you are an employee or official of a government organization, please click here for important ethics information regarding this event.
Oracle values your privacy, and will treat the information we collect from you as a result of your registration and participation in this activity in accordance with the Oracle Privacy Policy.
Event Details:
Wednesday, May 15, 2013
8:30 AM – 12:00 PM

Suite 1&2 , Level 7,
Hilton, 3 Jalan Stesen Sentral,
Kuala Lumpur, 50470, Malaysia
A map marking my location
Stay Connected:
Oracle on Facebook Oracle on LinkedIn Oracle on Youtube Oracle on Twitter Google+ Oracle Mix
Bookmark & Share:


15-MAY-13