Hi {{ session.user.profile.firstName }}

Mobile Apps under Attack – How to Secure and Protect Your Apps

Manage webcast
James Lynn, Practice Principal, HP Fortify; Vince Arneja, VP of Product Management, Arxan Technologies
Join us to explore the mobile application threat landscape and identify ways to prepare for reverse engineering and tampering attacks.

The mobile App Economy is growing explosively as businesses are seeking to embrace innovation to provide new products and services to consumers, partners, and employees. However, malicious hackers and criminal organizations are now targeting these applications with a growing number of sophisticated attacks. Security of mobile apps, rather than devices, has become the new focal point as well as a top level concern for all stakeholders.

In this webinar, mobile security experts, Jason Schmitt, Director of Product Management of HP Fortify and Vince Arneja, VP of Product Management of Arxan Technologies will explore the mobile application threat landscape to identify a wide range of threats from vulnerability based attacks to reverse engineering and tampering attacks. The presenters will also address how to achieve comprehensive mobile application security within the SDLC to manage risk and exposure for B2C, B2E and B2B applications and protect today’s App Economy from theft, fraud, malware invasion, and tampering. You will gain insights how to develop and launch vulnerability-free, self-defending, and tamper-proofed applications that can withstand the new attacks.

HP Fortify is the leader in Software Security Assurance with solutions that contain, remove, and prevent software vulnerabilities. Arxan Technologies is the leader in protecting the App Economy with application protection solutions that are deployed on over one hundred million devices by Fortune 500 and global financial services.
Jul 11 2012
47 mins
Mobile Apps under Attack – How to Secure and Protect Your Apps
More from this community:

IT Security

  • Date
  • Rating
  • Views
  • The Nordic region is known for its natural resources, innovations in renewable energy and healthcare, proximity to the Arctic, and emphasis on transparency in government. However, these unique attributes make the region a prime target for cyber threat groups looking to capitalize on Nordic countries’ robust economies and distinct geopolitical concerns. FireEye Threat Intelligence assesses that threat actors aggressively target strategic industries and government and military organizations in search of valuable economic, political, or military intelligence.

    In this webinar we will be drawing on the findings from our recent report, Cyber Threats to the Nordic Region.

    Register now to learn about:

    •Some of the specific threat activity we have observed against Denmark, Finland, Iceland, Norway, and Sweden
    •Attacks on Critical Infrastructure in the Nordics
    •The motivations and drivers of future threat activity in the Nordics
    •How to respond to advanced attacks
  • Our dependencies are clear. Organisations have become virtual, and all of this progress relies on systems and infrastructure that no one organisation maintains, and there is no turning back. Significant time and resources are being dedicated to coping with mistakes and oversights, while remediation time following system or data compromise is steadily getting longer.
    Industry has been cornered into a reactionary position addressing incidents as they occur.

    Such concerns are set to dominate discussions at the 2nd Annual (ISC)² Security Congress EMEA, October 20-21 in Munich, Germany.

    Join (ISC)², Infosecurity Magazine and two of the several top notch (ISC)² Security Congress EMEA speakers to examine our progress, how to challenge our reactionary position, and what is required to look forward to the future.

    Moderator: Michael Hine, Deputy Editor, Infosecurity Magazine
    Panellists: Adrian Davis, Managing Director, (ISC)² EMEA; Yiannis Pavlosoglou, Director of IT Risk, UBS; Georg Freundorfer, Director Security EMEA, Oracle

    WIN A FREE TICKET TO CONGRESS!
    (ISC)² is giving away 3 delegate passes for the 2015 (ISC)² Security Congress EMEA, to delegates who view the webinar for a minimum of 50 minutes. Winners will be announced live at the end of the webinar and subsequently emailed with information on how to redeem their prizes. The free pass is valid for all sessions including pre-conference workshops and networking opportunities. For further details on the prize draw and full T&C’s, please copy and paste the following link to your browser: http://bit.do/isc2emeacongressprize
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • The consumerization of IT, bring your own device (BYOD), and software-as-a-service (SaaS) provide organizations with impressive productivity gains, but bring with them the challenge of secure management. Grady Boggs, Principal Security Specialist, illustrates the Microsoft comprehensive cloud solution, the Enterprise Mobility Suite (EMS), and details how users can stay productive while keeping corporate information safe and secure.
  • You already know the power of application segmentation to deliver data center and cloud security—now you can take segmentation to the next level. Nano-segmentation is finally a reality.

    In 15 minutes, we’ll show you how nano-segmentation delivers the most granular, adaptive security across your data centers and public clouds.
    Register to find out how to:

    - Reduce your data center and cloud attack surface by 99%
    - Quarantine compromised servers in seconds
    - Achieve compliance in hours
  • Patching systems and applications is a huge challenge, and doing it manually is not an option.
    In this session Microsoft MVP Raphael Perez will look at the basics of SCCM Automation with PowerShell. You'll learn when automation should be used, get tips on making the most of WMI, SCCM PowerShell cmdlets and some of the techniques he uses when creating automation scripts.

    Live attendees of this session will automatically participate in a draw of three editions of Raphael’s latest publication: System Center 2012 R2 Configuration Manager: Automation from Zero to Hero

    About Raphael Perez: Raphael is one of the only three ‘Enterprise Client Management MVPs‘ based in UK, specialising in System Center Configuration Manager (SCCM) and with over a decade of front-line enterprise experience of working with Microsoft technology and Management solutions. Raphael has worked on a number of different enterprise SCCM, OS Deployment and Patch Management projects over the years.
  • Today’s cyber defenses generate a torrent of security alerts. Some of them can be useful, even essential. Many are not. And telling the difference isn’t always easy.

    When assessing security products, organizations often equate a large volume of alerts with more thorough threat detection. But as anyone who’s been roused awake by a car alarm at 3 a.m. knows, it’s the quality of these alerts—not the quantity—that really matters.

    This webinar will examine the four biggest problems with reactive, alarm-based defenses in conventional security deployments.

    Join us to:

    -Learn how to alleviate alert fatigue
    -Detect true threats, provide quality alerts and enhace them with ample context and insight so security teams can act on them
    -Sort out the alerts you must respond to from those you should respond so
    -Discover how to recognize multiple separate alerts that might be part of a multi-pronged attack on your network

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mobile Apps under Attack – How to Secure and Protect Your Apps
  • Live at: Jul 11 2012 3:00 pm
  • Presented by: James Lynn, Practice Principal, HP Fortify; Vince Arneja, VP of Product Management, Arxan Technologies
  • From:
Your email has been sent.
or close
You must be logged in to email this