Hi [[ session.user.profile.firstName ]]

Mobile Threats: What Can Hide Beneath Your Apps & How to Get Rid of Them

Mobile security threats can affect both Android and iOS devices. In this webinar on September 28, 2021 at 1 p.m, BST, (ISC)2 and Comarch will explore the most dangerous security vulnerabilities on these platforms. We will start from common problems like root and jailbreak which are very often the beginning of attack that leads to serious financial loses.

Then, we will compare different threats to find the most dangerous for our customers in terms of financial/business loses. The webinar shall provide details of heuristic and AI based solutions in terms of accuracy according to rapid changes of vector attack as well as Android/iOS platform capabilities comparison in terms of security gaps. Finally, we will go through best security practices to detect and prevent such threats on each platform. Described technics and mechanisms will help to choose between most common security solutions on the market.
Recorded Sep 28 2021 59 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Adrian Korczyński, Cyber Security Business Unit Dir; Michał Olawski, Cyber Security Department Dir; Brandon Dunlap, Mod
Presentation preview: Mobile Threats: What Can Hide Beneath Your Apps & How to Get Rid of Them

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Top Five Cybersecurity Predictions for 2022 Dec 15 2021 6:00 pm UTC 60 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    This year was particularly challenging for IT security professionals. For a short while, we thought we finally had this pandemic kicked. Then the Delta variant came along, further extending the work-from-home movement and its associated cybersecurity risks. Meanwhile, we saw record-setting ransomware attacks, including high-profile attacks on critical infrastructure, while the shortage of IT security talent worsened. On a brighter note, we saw increased adoption of promising security technologies, such as zero trust network access (ZTNA) and secure access service edge (SASE).

    So, what does next year have in store for the cybersecurity industry? Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he shares his top five cybersecurity predictions for 2022.
  • Gain Comprehensive, Multi-Dimensional Visibility Across Digital Infrastructures Dec 14 2021 1:00 pm UTC 60 mins
    Tom Bienkowski, Dir of Product Mktg, Netscout; Mark Doering, Dir of Technical Mktg, Netscout; Brandon Dunlap, Moderator
    Security Operations Centers (SOC) have traditionally achieved visibility through varying sources, including log files, EDR, and NDR. Each approach has inherent weaknesses and strengths, converging on a superior NDR method. For example, if the flow of data is too broad, and packets can be challenging without highly scalable network instrumentation that converts raw packets into enriched metadata for longer-term and superior analytics. Using a more intelligent network-based security strategy, SOCs can maintain broad and deep network visibility to improve the quality, reliability, and security of services. Join Netscout and (ISC)2 on October 28th, 2021 at 1 p.m., GMT for a discussion on how to use packet-derived metadata, behavioral analysis, and threat intelligence to reduce MTTR (i.e., Mean Time To Resolution) it takes to detect, investigate and remediate cyber or other IT threats. We’ll explore:

    -How to leverage a robust set of metadata and packets to become a more agile and proactive cybersecurity analyst
    -Why leveraging the same network instrumentation and common source of metadata and packets is advantageous for Net & Sec Ops When and how tap and decryption capabilities are to be addressed
    -How to deploy intelligent network instrumentation in a hybrid cloud environment for a security optimal cyber posture
  • Open Doors with CCSP- How to Start Your Career in Cloud Security Dec 8 2021 6:00 pm UTC 60 mins
    James Packer, Joe South, Angus Macrae
    Cloud is an intrinsic part of our everyday lives both personally and professionally. With more organizations running vital business functions in the cloud, the demand for cloud security professionals has never been higher.

    (ISC)2 interviewed about 50 Certified Cloud Security Professionals (CCSPs) who achieved this credential mid or later in their careers and asked them why they chose to add the CCSP to their skillset and the benefits they experienced as a result. And we want to share their answers with YOU!

    Join our live panel of distinguished CCSPs and host Brandon Dunlap on Wednesday, December 8th at 1pm EST to find out why our panelists and thousands of others have pursued the CCSP credential.

    Accelerate Your Career in Cloud Security – with CCSP

    Save your spot today!
  • Building Cyber Resilience with Managed Phishing and Security Awareness Training Dec 2 2021 1:00 pm UTC 60 mins
    Mark Sangster, Vice President and Industry Security Strategist, eSentire; Brandon Dunlap, Moderator
    The majority of crippling cyberattacks begin with a simple phishing email. And while most companies provide some form of annual training, they focus on overly simplistic lures taken from public events that fail to represent the real danger of targeted criminal campaigns. Join eSentire and (ISC) 2 on December 2nd, 2021 at 1:00 p.m. as they explore how to build a comprehensive training and testing programme that leverages realistic threat scenarios to foster context-relevant security awareness that drives behavioral change:

    o Use risk management data and accurate phishing lures to build comprehensive awareness training

    o Maximise your resources and programmes to increase return on investment

    o Conduct testing that improves resilience

    o Meet regulatory requirements and demonstrate programme success to your leadership
  • The Defeat of Cyber Threats Begins with Asking the Right Question Nov 30 2021 1:00 pm UTC 60 mins
    Serge Woon,Technical Director Global, Co-Founder, ReaQta; Brandon Dunlap, Moderator
    Cyber threats will only continue to rise globally as the ROI of such attacks has unfortunately been proven. Coupled with the emergence of Ransomware-as-a-Service, the barriers for cyber crime to take place have been significantly lowered, causing more to fall prey. Many organizations today use legacy solutions to fight cyber threats, but find that they are losing the race as such methods may be outdated or ineffective. This is apparent when big organizations around the globe are impacted by ransomware attacks. To understand this race better, organizations need to change the question that will help them future proof their organizations against cyber threats. Join ReaQta and (ISC)2 on November 30, 2021 at 1:00p.m. GMT for a discussion on how to stay protected against cyber threats now and into the future.
  • #fastsecure: Security in the Age of Kubernetes Nov 23 2021 1:00 pm UTC 60 mins
    Kevin Bocek, VP, Security Strategy & Threat Intelligence, Venafi; Matt Barker, President, Jetstack; B. Dunlap, Moderator
    Security teams need new approaches to work with the super fast development cycles that are inevitable when using Kubernetes and OpenShift. New research found 96% of enterprises using Kubernetes or OpenShift recently experienced a security related issue from a workload misconfiguration. One example: developers use non-enterprise approved Certificate Authorities CA(CAs) for TLS machine identities with Kubernetes, OpenShift, Istio and more making initiatives like Zero Trust impossible. These gaps won’t be fix with more controls pushed down from security teams. Developers today decide cloud-native security tooling. Security and developers need to operate in a #fastsecure mode: going as fast as possible while staying safe. Join Venafi and (ISC)2 on November 23, 2021 at 1:00p.m. GMT as open source innovator, Matt Barker, and security leader, Kevin Bocek discuss what #fastsecure means and how you can get started. The developer-led, cloud-native world doesn’t mean that security teams are any less important; just the opposite. Going faster means security teams bring their experience with threat protection, machine identity, risk and compliance to help developers stay safe at highest speeds.
  • The Cloud Gambit: Advanced Moves for a Cloud Security Career Nov 17 2021 6:00 pm UTC 59 mins
    Keatron Evans, Dave Hatter, Charlie Platt
    Taking the step toward earning the (ISC)² Certified Cloud Security Professional (CCSP) credential puts you on a path to excel as an expert in cloud security. CCSP empowers individuals and organizations with the highest level of mastery in cloud security.

    But how do you get started? How do you prepare? And why…what tangible benefits will you gain? Join (ISC)² for a panel discussion as industry professionals share their stories, experience and tips toward preparing for the Certified Cloud Security Professional certification. Areas for discussion will include:

    - Why you should consider CCSP
    - How to prepare for CCSP
    - How CCSP can accelerate your career progression
  • Compliance Begins with People: A Case Study from a Leading Financial Institution Nov 16 2021 1:00 pm UTC 60 mins
    Stephen Fulton, Proofpoint, Dennis Sullivan, Vice President, Senior Compliance Officer, PIMCO; Brandon Dunlap, Moderator
    Do you know who in your organisation has the most significant exposure to compliance risk? Are they at risk because of their actions, or are they targets? How do you build a complete picture of their risk profile identifying potential risky behaviour? Join Proofpoint, (ISC)2 and Dennis Sullivan, Vice President, Senior Compliance Officer of Industry Leading Pimco, to listen to a case study on how they achieved world-class Supervision, from implementation, optimisation in production and how to look ahead to apply practical AI machine learning. On November 16, 2021 at 1:00p.m. GMT you’ll discover how big data analytics and ML can be brought to bear in the fight against misconduct by building an effective people-centric view, promoting a culture to protect your people from compliance violations, whilst safeguarding the whole organisation. Learn the practical steps now and how to scale into the future.
  • Lighting a Path to Zero Trust: 6 Steps to Implementing a Zero Trust Model Nov 11 2021 1:00 pm UTC 60 mins
    Adam Brady, Director Systems Engineering, Illumio; Raghu Nandakumara, Field CTO, Illumio; Brandon Dunlap, Moderator
    Despite acknowledging its security benefits, many organizations hesitate to implement a Zero Trust model. An "all or nothing" approach to Zero Trust is a tall and unsustainable task. What if you took a more incremental, agile approach that allows your organization to make realistic steps toward achieving Zero Trust? Join Illumio and (ISC)2 on November 11, 2021 at 1:00 p.m. GMT as we will discuss:

    • Why taking a waterfall approach to rolling out Zero Trust is fraught with risk of failure

    • How adopting an agile mindset significantly improves the chances of success of achieving the Zero Trust security goals

    • The six steps to pragmatically build your Zero Trust security program using a repeatable process

    • How security controls like segmentation can help tackle focus areas such as workload protection

    • A demonstration of each of the six steps in action in the context of segmentation – see how an application is taken through the full cycle
  • Strategies for Recruiting and Retaining Top IT Security Talent Nov 10 2021 6:00 pm UTC 60 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    Recruiting and retaining qualified IT security talent has never been more challenging. Nearly nine in 10 organizations are experiencing a shortfall, according to CyberEdge’s 2021 Cyberthreat Defense Report. That’s up from eight in 10 organizations just three years ago. This weighs heavily on the minds of IT security managers as ‘lack of skilled personnel’ is consistently rated as one of the top inhibitors to successfully defending networks against cyberthreats. So, what can organizations do to mitigate the effects of this talent shortage? Well, if you’re willing to ‘think outside the box,’ there is hope. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he:

    Examines the shortage of IT security personnel by job role
    Proposes creative ways for recruiting new security talent
    Suggests clever ways for retaining the talent you already have
    Identifies technologies that enable security teams to do more with less
  • CISSP: The Time Is Now Nov 9 2021 6:00 pm UTC 60 mins
    Adesoji Ogunjobii, CISSP-ISSAP, CCSP, Chris Clinton, CISSP, Samana Haider, CISSP, Tiffany Temple, CISSP, SSCP
    The future is created by what you do today. Oftentimes we don’t feel we are ready to take what seems like a big step forward. But we want to show you why now is the best time to make that first step on your CISSP journey.

    People from all walks of life, of various generation, from every industry and with different lifestyles have all succeeded in their mission to achieve the CISSP. Through this webinar our panel of CISSPs want to share the different paths you can take to achieve the CISSP and the benefits that the CISSP brings to your career.

    Join our live panel of distinguished CISSPs and host Brandon Dunlap on Tuesday, November 9th at 1pm ET to take that first step on the ladder to harnessing the CISSP credential. Stronger cybersecurity starts with CISSP!

    Save your spot today!
  • Cyber Insurance: Optimizing Costs While Minimizing Risk Nov 9 2021 1:00 pm UTC 60 mins
    Gary Cox, EMEA Product Specialist, Infoblox; Brandon Dunlap, Moderator
    With hybrid workplaces now the new norm and supply chain attacks on the rise, there’s an increased exposure to cyber-attacks, which can cause substantial disruption to any organization or industry. This increased exposure is forcing companies to not only invest and improve their own cybersecurity posture, but also manage third party risk and protect against cyber risks with cyber insurance. Certain best practices and technologies help reduce your risk and improve your security score while helping to keep insurance premium costs low. DNS security is one such approach that provides extended visibility, protection and security automation to improve a company’s security posture.

    Join Infoblox and (ISC)2 November 9th, 1 p.m., GMT for this webinar to learn more about:

    o Why organizations invest in cyber insurance

    o Getting the most out of cyber insurance

    o How DNS security improves security scores and reduces cyber insurance premiums
  • Leveraging the Assume Breach Mentality Nov 2 2021 1:00 pm UTC 60 mins
    Eli Marquez, Linux Security Advocate, Intezer Labs; Brandon Dunlap, Moderator
    With a staggering growth in the number of vulnerabilities and a constantly changing attack surface, companies begin their transition to the cloud at a disadvantage in their security posture. Threat actors understand this and better than we do and are quickly morphing their traditional attacks to take advantage of the situation. At the end of the day there was fact that all companies must accept, breaches happen. On November 2, 2021 at 1:00pm BST join Ell Marquez, Linux Security Advocate at Intezer, for exploring how assume breach doesn’t mean all the money you spent on security solutions is going to waste and what really is meant by assume breach and what makes an effective assume breach strategy.
  • BT Sets the Bar Higher with Official (ISC)2 CISSP Team Training Recorded: Oct 27 2021 58 mins
    Jonathan Kilgannon, Cathy Marsh and Mirtha Collins
    Building a strong cybersecurity team takes grit. The best results don’t always come at the first pass. When BT, a world-leading communications provider headquartered in London with offices globally, tasked CSIRT Training Specialist Jonathan Kilgannon with raising the bar for success among the company’s CISSP candidates, he delivered. Average exam pass rates jumped to 90% percent — a 40% increase — following the changes he implemented in the training process. Find out how identifying the right candidates, preparing them in advance and (ISC)2 Official In-Person Team Training made all the difference.
  • (ISC)2 Town Hall 2021 Recorded: Oct 18 2021 92 mins
    Clar Rosso, Zachary Tudor, Lori Ross O'Neil and Dr. Casey Marks
    Join us for (ISC)2 Security Congress Town Hall to learn what’s next for (ISC)2 and hear directly from members of the Board of Directors.

    CEO Clar Rosso will provide a strategic update for our association, including recent accomplishments and milestones, as well as what members can expect in 2022 and beyond.

    Then, a panel consisting of (ISC)² Board members and management will answer members’ questions about the association, membership, certifications, workforce trends and other cybersecurity issues and challenges facing the profession.

    Town Hall is open to (ISC)2 members and associates, as well as all Security Congress attendees.

    Featuring:
    Clar Rosso, CEO, (ISC)2
    Zachary Tudor, CISSP, Board of Directors Chairperson
    Lori Ross O'Neil, CISSP Board of Directors Vice Chairperson
    Dr. Casey Marks, Chief Qualifications Officer, (ISC)2
  • Hybrid Cloud – Avoiding a Worst of Both Worlds Outcome Recorded: Oct 14 2021 59 mins
    Ian Farquhar, Global Field CTO and Director of the Security Architecture Team, Gigamon; Brandon Dunlap, Moderator
    Most organisations plan cloud migrations, but few achieve a full migration to the cloud, ending up with a hybrid deployment. This works for many, but for others it can be a “worst of both worlds” situation, with differing toolsets, increased costs, inconsistent visibility for security, operations and compliance leading to risk and issues. Some organisations are even repatriating workloads back from the cloud: not a good outcome. How can you benefit from a hybrid deployment, and avoid the downsides?

    Join Gigamon and (ISC)2 on October 14, 2021 at 1 p.m., BST when we will discuss how hybrid networks can be architected to deliver operational capabilities, security outcomes and compliance requirements.
  • Is Zero Trust a Pipe Dream? Debunking Five Zero Trust Security Myths Recorded: Oct 12 2021 59 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group
    Zero trust network access (ZTNA) has been one of the most widely discussed and debated security technology categories in recent years. While most enterprise IT security teams have already started drinking the zero trust Kool-Aid, there are still some skeptics who are hesitant to embrace zero trust architectures for a variety of reasons. Join Steve Piper, Founder & CEO of CyberEdge (and proud CISSP), as he debunks five common zero trust security myths so you can distinguish between fact and fiction.
  • Keeping Ransomware Attacks at Bay with DNS Recorded: Oct 12 2021 59 mins
    Senad Aruc, Lead Technical Solutions Architect; Ivan Berlinson, Technical Security Architect; Brandon Dunlap, Moderator
    Ransomware currently dominates the headlines and is top of mind for many. DNS can be used to improve protection against ransomware campaigns and speed up investigations of such incidents. In this session, we’ll share fresh tactics, techniques, and procedures (TTPs) used by ransomware actors which actively adopt advanced persistent threat (APT)-style tactics and evasion techniques. These actors’ goals have shifted from deploying ransomware on a few vulnerable machines to achieving persistence in the network and causing maximum damage to push victims into paying the ransom.

    On October 12th, 2021 at 1 p.m. BST, join the Cisco Umbrella team and (ISC)2 as they share DNS-based classifiers developed by Cisco and discuss their approach to building them based on changes in the threat landscape.
  • WAAS-up with Web App and API Security? Recorded: Sep 30 2021 59 mins
    Scott McAndrew, Cloud Native Security Engineer - Prisma Cloud, Palo Alto Networks; Brandon Dunlap, Moderator
    The very thought of web application security usually elicits strong feelings of dread. This is an area of security which oftentimes requires specialist knowledge and intimate understanding of our business application architecture. In parallel to this conundrum, the long-broken dawn of cloud technologies, and in turn, cloud-native applications has monumentally exploded the number of web applications available to us all today. Web application security as we know it can be difficult to adapt to this paradigm because it has its roots in legacy architectures that were very static in nature. Join Palo Alto Networks and (ISC)2 on September 30, 2021 at 1:00 p.m. BST as we explore how modern microservices-based web applications work and the unique security challenges that arise from this otherwise exciting new world. We will not only discuss the capabilities of Prisma Cloud, but to keep things interesting there will be a live demo of a microservices-based application which we will attack.
  • Mobile Threats: What Can Hide Beneath Your Apps & How to Get Rid of Them Recorded: Sep 28 2021 59 mins
    Adrian Korczyński, Cyber Security Business Unit Dir; Michał Olawski, Cyber Security Department Dir; Brandon Dunlap, Mod
    Mobile security threats can affect both Android and iOS devices. In this webinar on September 28, 2021 at 1 p.m, BST, (ISC)2 and Comarch will explore the most dangerous security vulnerabilities on these platforms. We will start from common problems like root and jailbreak which are very often the beginning of attack that leads to serious financial loses.

    Then, we will compare different threats to find the most dangerous for our customers in terms of financial/business loses. The webinar shall provide details of heuristic and AI based solutions in terms of accuracy according to rapid changes of vector attack as well as Android/iOS platform capabilities comparison in terms of security gaps. Finally, we will go through best security practices to detect and prevent such threats on each platform. Described technics and mechanisms will help to choose between most common security solutions on the market.
(ISC)² Security Briefings - EMEA
(ISC)² Security Briefings EMEA offers members in Europe, the Middle East and Africa a chance to learn about the latest trends, tools and best practices in cyber, information, software and infrastructure security while earning CPEs

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mobile Threats: What Can Hide Beneath Your Apps & How to Get Rid of Them
  • Live at: Sep 28 2021 12:00 pm
  • Presented by: Adrian Korczyński, Cyber Security Business Unit Dir; Michał Olawski, Cyber Security Department Dir; Brandon Dunlap, Mod
  • From:
Your email has been sent.
or close