Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

The Nightmare After Christmas: Plugging the Mobile Security Gap

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Personal devices are now very capable and every bit as powerful as PCs were a few years ago. And people expect to be able to use their devices at work: Mobile is the new normal. This holiday season, mobile devices - especially tablets or cell phones  -are likely to be once again set to be a very popular gift.

Yet while unwrapping a shiny new gadget might well bring joy to employees, for security teams the problems really start in January when people try to connect such devices to the office network.

Moreover a lot of security teams don't see mobile as a high-risk threat, even though attackers increasingly see it as a sweet spot. Mobile devices are the backdoor to the corporate network and sophisticated attacks can exploit it, unless enterprises act now to close the door.

In this webinar we will delve into the mobile security threat and:

  • Examine recent exploits such as xCodeGhost (iOS) and Trojanised Adware (Android);
  • Look at the growing risk posed by mobile devices especially as businesses do more on the move;
  • Set out strategies for CISOs to secure and manage mobile devices to reduce the threat and
  • Assess how tools including machine learning can bolster enterprises' defenses whilst allowing staff to work where they choose.

Speakers

Tom Davison

Senior Sales Engineer Manager, Lookout

    Laurance Dine

    Managing Principal, Investigative Response, Verizon RISK Team

      Stephen Pritchard

      Moderator, Infosecurity Magazine

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.