Protect Your High Value Mobile Apps from Low Quality Attacks

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Minimizing Risk in Protecting Your High Value Mobile Apps 

Mobile apps are one of the primary ways your users experience your brand and services, but these can be also be a major security risk if they can be reverse engineered and repackaged with malware. Evidence from 2017 has shown that attackers can target your enterprise's high value apps, reverse engineer them with malware and repost them for unsuspecting customers.

In this webinar, we will look at how to protect these valuable assets, both in how to protect an app that your users download and you do not control, as well as what apps you’re deploying. We will also look at options to protect your apps, and enterprise from malicious attacks.

Key takeaways:

  • What steps can you take to ensure minimum impact when apps are tampered with?
  • How to ensure you have the right processes and strategies in place for efficient application security
  • What does OWASP and application security guidelines suggest for the protection of mobile apps? 
  • What are the compliance and GDPR regulations when a data leak such as this happens?


Photo of Winston Bond

Winston Bond

Mobile application security expert, Arxan

Photo of Paul Conaty

Paul Conaty

Lead Consultant and Solutions Architect at, CWSI

Photo of Pau Oliva

Pau Oliva

Senior Security Consultant, IOActive, Inc.

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.