Defining Your Mobile Identity Management Strategy
While 90% of organization will deploy mobile applications to their end users, 76% of these applications today store the credential on the device and 10% of these store passwords in plain text. If you are planning to deploy and support mobile applications for your end users or customers, then you will need a security strategy.
With many devices and many operating systems, this can be a challenge. The next device on your network will be an employee owned device not tested by your IT department.
As users connect from multiple devices with multiple applications, a policy driven approach can reduce cost and risk.
Join us for this event and you will learn:
- How a security inside-out strategy will provide a more cost effective way to secure mobile access.
- How to apply emerging Mobile Identity Management standards to secure mobile applications.
- How to apply the results of a recent SANS study to develop a mobile access policy and reduce risk.
Don't miss this chance to network with your peers, share your ideas and speak with Oracle experts about how to extend your Identity Management infrastructure and policies to secure mobile applications.
For more information, please contact email@example.com
Or +6 03 9286 2158
|Time || |
Registration and Breakfast
Keynote: Mobile Security Begins Inside
With over 5.9 billion mobile devices world wide, IT organizations have to re-think they way security is delivered for mobile platforms. With mobile security, complexity is the enemy of scale. Multiple devices, mobile operating systems and applications require a standards based approach that can extend enterprise security "inside out". In this session we will discuss how a security inside our approach can provide a more cost effective way to secure mobile applications
Session 1: Demystifying Mobile Identity Management & Standards
Creating a mobile device strategy can be a challenge for many organizations because the standards and best practices are constantly changing. In this session we will provide a primer on mobile Identity Management and the standards emerging for securing mobile applications. We will demystify the capabilities of the standard and provide some real world examples of how these standards are being utilized.
Session 2: SANS Institute Mobility Security Survey Results and discussion
This session, we will share more of the result findings from the survey conducted by SANS Institute on Mobility Policy and Management with over 650 respondents weighed in on topics and trends such as BYOD risk and security policies and overall risk management programs. You will hear also more about how these companies are integrating BYOD security in their risk management programs, critical risk factors impacting an organization’s Mobility policy and steps you can take today to securely integrate the BYOD program