Manage, Monitor & Audit: The Mobile User

Now On Demand

The greatest threat of a data breach –intentional or not - continues to be from employees, contractors and partners – people you are supposed to be able to trust. This webcast explores policies, technology and best practices to manage, monitor and audit the use of mobile devices as part of a larger Identity Management strategy.

In this webcast, originally hosted by ISACA, we discussed:
  • How mobile is changing the concept of enterprise security
  • What implications mobile adds to the security challenge
  • Processes and steps that can be put in place to mitigate these risks


Mark Wilcox
Senior Principal Product Manager, Oracle

 If you have previously registered, please login now:

Registration is required to attend this event. Please register now.
First Name*
Last Name*
Street Address Line 1*
Street Address Line 2
If outside of US/Canada, please select Non-US/Canada from the State dropdown options.
Job Title*
 Please send me e-mail communications with information about Oracle products, services and upcoming events.
You must have javascript and cookies enabled to complete registration. Click here for Help.
Please enable Cookies in your browser before registering for the webcast.
*Denotes required.

Privacy Link | Legal Notices | Contact Us