Protect Your High Value Mobile Apps from Low Quality Attacks

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

Minimizing Risk in Protecting Your High Value Mobile Apps 

Mobile apps are one of the primary ways your users experience your brand and services, but these can be also be a major security risk if they can be reverse engineered and repackaged with malware. Evidence from 2017 has shown that attackers can target your enterprise's high value apps, reverse engineer them with malware and repost them for unsuspecting customers.

In this webinar, we will look at how to protect these valuable assets, both in how to protect an app that your users download and you do not control, as well as what apps you’re deploying. We will also look at options to protect your apps, and enterprise from malicious attacks.

Key takeaways:

  • What steps can you take to ensure minimum impact when apps are tampered with?
  • How to ensure you have the right processes and strategies in place for efficient application security
  • What does OWASP and application security guidelines suggest for the protection of mobile apps? 
  • What are the compliance and GDPR regulations when a data leak such as this happens?


Winston Bond

Mobile application security expert, Arxan

    Paul Conaty

    Lead Consultant and Solutions Architect at , CWSI

    Pau Oliva

    Senior Security Consultant, IOActive, Inc.

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.