Star 0

Abstract

Securing data to meet the mobility challenge in this new world of borderless connectivity requires not "martial law" but IT leading business stakeholders to define a policy to address the role, value, and risk of mobility – leading to transformation paths for applications and services to focus on vulnerabilities. The session will offer a set of initiatives to establish secure freedom to be mobile.