 |
Manage, Monitor & Audit: The Mobile User
Now On Demand
The greatest threat of a data breach –intentional or not - continues to be from employees, contractors and partners – people you are supposed to be able to trust. This webcast explores policies, technology and best practices to manage, monitor and audit the use of mobile devices as part of a larger Identity Management strategy.
In this webcast, originally hosted by ISACA, we discussed:
- How mobile is changing the concept of enterprise security
- What implications mobile adds to the security challenge
- Processes and steps that can be put in place to mitigate these risks
Speaker:
Mark Wilcox
Senior Principal Product Manager, Oracle
|
|
|