Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Protect Your High Value Mobile Apps from Low Quality Attacks

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

Minimizing Risk in Protecting Your High Value Mobile Apps 

Mobile apps are one of the primary ways your users experience your brand and services, but these can be also be a major security risk if they can be reverse engineered and repackaged with malware. Evidence from 2017 has shown that attackers can target your enterprise's high value apps, reverse engineer them with malware and repost them for unsuspecting customers.

In this webinar, we will look at how to protect these valuable assets, both in how to protect an app that your users download and you do not control, as well as what apps you’re deploying. We will also look at options to protect your apps, and enterprise from malicious attacks.

Key takeaways:

  • What steps can you take to ensure minimum impact when apps are tampered with?
  • How to ensure you have the right processes and strategies in place for efficient application security
  • What does OWASP and application security guidelines suggest for the protection of mobile apps? 
  • What are the compliance and GDPR regulations when a data leak such as this happens?

Speakers

Winston Bond

Mobile application security expert, Arxan

    Paul Conaty

    Lead Consultant and Solutions Architect at , CWSI

    Pau Oliva

    Senior Security Consultant, IOActive, Inc.

    Dan  Raywood

    Contributing Editor, Infosecurity Magazine

    Brought to You by