Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

The Nightmare After Christmas: Plugging the Mobile Security Gap

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Personal devices are now very capable and every bit as powerful as PCs were a few years ago. And people expect to be able to use their devices at work: Mobile is the new normal. This holiday season, mobile devices - especially tablets or cell phones  -are likely to be once again set to be a very popular gift.

Yet while unwrapping a shiny new gadget might well bring joy to employees, for security teams the problems really start in January when people try to connect such devices to the office network.

Moreover a lot of security teams don't see mobile as a high-risk threat, even though attackers increasingly see it as a sweet spot. Mobile devices are the backdoor to the corporate network and sophisticated attacks can exploit it, unless enterprises act now to close the door.

In this webinar we will delve into the mobile security threat and:

  • Examine recent exploits such as xCodeGhost (iOS) and Trojanised Adware (Android);
  • Look at the growing risk posed by mobile devices especially as businesses do more on the move;
  • Set out strategies for CISOs to secure and manage mobile devices to reduce the threat and
  • Assess how tools including machine learning can bolster enterprises' defenses whilst allowing staff to work where they choose.


Tom Davison

Senior Sales Engineer Manager, Lookout

    Laurance Dine

    Managing Principal, Investigative Response, Verizon RISK Team

      Stephen Pritchard

      Moderator, Infosecurity Magazine

        Brought to You by