From a Trickle to a Flood – Best Not to Stand in the way of Mobile Applications
1 Apr 2013
|From a Trickle to a Flood – Best Not to Stand in the way of Mobile Applications.pdf||12.88 MB|
Having progressed running simple calendaring and email, to providing access to business applications mobile devices are becoming an increasing feature of an organization's business activities. Users expect a consistent experience. Information security expect consistent security. This session will look at the unique challenges the move to mobile devices bring, some ideas on managing those challenges, and how security really can be an enabler, not an inhibitor. This session will be provide an overview of how to enable the business to deploy mobile applications in a way that supports the users whilst still maintaining a strong security posture. This session will be of interest to those developing and deploying mobile applications and those who are considering mobilizing their corporate applications.
James was bought on board Oracle New Zealand when Oracle established an identity management business in New Zealand in 2008. As a sales consultant James provided not only the link between Oracle product and customer requirements, but also advice relating to best practices around security generally. Prior to Oracle James was a security consultant with CA Technologies for about 7 years during which time he represented wide range of security areas from network forensics to identity management. He has had a a varied background that ranges from product management for mobile telephony billing mediation systems to pre-sales specialist for emergency services dispatch systems James is a Certified Information Systems Auditor (CISA), and a Certified Information System Security Professional (CISSP).