Defining Your Mobile Identity Management Strategy
While 90% of organization will deploy mobile applications to their end users, 76% of these applications today store the credential on the device and 10% of these store passwords in plain text. If you are planning to deploy and support mobile applications for your end users or customers, then you will need a security strategy.
With many devices and many operating systems, this can be a challenge. The next device on your network will be an employee owned device not tested by your IT department.
As users connect from multiple devices with multiple applications, a policy driven approach can reduce cost and risk. Save the date and Join us on 21 February 2013
for this event and you will learn:
- How a security inside-out strategy will provide a more cost effective way to secure mobile access.
- How to apply emerging Mobile Identity Management standards to secure mobile applications
- How to apply the results of a recent SANS study to develop a mobile access policy and reduce risk.
Don't miss this chance to network with your peers, share your ideas and speak with Oracle experts about how to extend your Identity Management infrastructure and policies to secure mobile applications. Register now
for this FREE event.
|9:45 a.m.||Keynote: Mobile Security Begins Inside|
With over 5.9 billion mobile devices worldwide, IT organizations have to re-think the way security is delivered for mobile platforms. (more..)
|10:30 a.m.||Session 1: Demystifying Mobile Identity Management & Standards|
Creating a mobile device strategy can be a challenge for many organizations because the standards and best practices are constantly changing. (more..)
|11:30 a.m.||Session 2: SANS Institute Mobility Security Survey Results and discussion|
This session, we will share more of the result findings from the survey conducted by SANS Institute on Mobility Policy and Management with over 650 respondents weighed in on topics and trends such as BYOD risk and security policies and overall risk management programs. (more..)
*Agenda Subjected to Changes