Hi [[ session.user.profile.firstName ]]

Mobile Phishing, the biggest unsolved problem in cybersecurity

It only takes one errant tap to compromise a mobile device. This short video clip highlights the threats and how inconspicuous a phishing attack on a mobile device can be. You will also be able to download our latest whitepaper to understand mobile phishing facts that will help you make informed decisions on how to protect corporate data.
Recorded Jun 13 2018 1 min
Your place is confirmed,
we'll send you email reminders
Presented by
Lookout
Presentation preview: Mobile Phishing, the biggest unsolved problem in cybersecurity

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • It was an honest mistake. Prevent data leakage from productivity tools Recorded: Jul 29 2021 29 mins
    Sundaram Lakshmanan, CTO, SASE Products at Lookout
    Lookout's CTO of SASE Products, Sundaram Lakshmanan invites you and your colleagues to join him to discuss how to evolve your security strategy to prevent data loss.

    Whether an employee downloads a sensitive file or accidentally shares it with unapproved users, preventing leakage of confidential data through productivity tools is a necessity for the modern, connected enterprise.

    Watch this webinar to learn:

    - How Data Loss Prevention (DLP) technology has grown from what we've always known into what it is today.
    - How the application of DLP has changed in reaction to continuously evolving infrastructure.
    - How you can remediate DLP issues and challenges your organization is facing.
  • What are the risks series 1/4: Australia's most downloaded applications Recorded: Jul 21 2021 41 mins
    Zoran Pupovac
    Report based on the most common downloaded mobile applications used in Australia.
    We will analyse the most common downloaded mobile applications used every day in Australia, in order to highlight the compliance and security challenges.
    Agenda:
    1) Overview and ranking of the most used applications by Australians in 2020
    2) Analysis and summary of the risks associated with these applications
    3) Overview of mobile risks and how to protect against them (Malware, advanced compromise, phishing and network attacks)
  • Identify and remediate misconfigurations in Salesforce and Office 365 Recorded: Jul 16 2021 35 mins
    Mahesh Rachakonda, Vice President – Product & Solution Engineering at CipherCloud
    Cloud adoption is on the rise. Organizations are tapping to the unlimited supply of on-demand servers and services for business transformation and remote collaboration at reduced operational expenditure.

    But the skillset of IT teams is unable to match an organization's growing cloud portfolio. Difficulty in maintaining simultaneous visibility across all cloud apps creates a huge security gap, leaving the clouds susceptible to threats and breaches due to security and access misconfigurations.

    Join us for a webinar session on July 9, 2020, at 9 AM PDT to understand how CipherCloud’s Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) perform an automated assessment of your IaaS and SaaS landscape against well-defined security guidelines, reducing the operational complexity in managing multiple apps, preventing data loss from misconfigurations and ensuring compliance in a multi-cloud environment.
  • Best Practices: Operationalizing Security for O365 Collaboration Recorded: Jul 16 2021 51 mins
    Madhu Dodda, Senior Manager- Product Management & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    With the remote workforce becoming the norm for many organizations and adoption of Microsoft’s Teams and Office 365 platform growing at a furious pace, today’s security practitioners face a complex set of challenges as they seek to enable cloud collaboration while protecting sensitive data.

    In this informational webinar, learn how today’s leading-edge CASB solution empowers security operations teams to keep up with the pace of O365 deployment, offering a single pane of glass for email and collaboration security, along with related compliance. By delivering the full breadth of O365 monitoring, data in motion and enforcement capabilities, we’ll detail how CipherCloud CASB+ addresses critical capabilities including:

    - Securing data in Teams Channels and Chats, along with O365 email
    - Utilizing integrated DLP and IRM with multi-level policy enforcement
    - Detecting anomalous user behavior and enabling response
    - Leveraging Data Discovery to ensure data privacy and compliance.
    - Expanding policies across multiple cloud apps and platforms

    Register today for this O365 secure collaboration best practices webinar.
  • Capital One Data Breach - Seven Steps to Secure Sensitive Data on AWS Recorded: Jul 16 2021 57 mins
    Mahesh Rachakonda, Vice President – Product & Solution Engineering at CipherCloud
    Regardless of where the data is stored, it is prone to zero-days, bad actors, and human errors, even though Capital One is dedicated to consumer privacy and has stringent security controls. Capital One data was stored on a cloud service provided by Amazon Web Services. Organizations adopting cloud applications are struggling to protect from such emerging threats. Additionally, they need to satisfy regulatory demands, such as PCI, GDPR, the California Consumer Privacy Act, and HIPAA.

    The breach took place in stages across March and April 2019, and data became available to the hacker in decrypted form, raising the following cloud security concerns:

    Is the encryption provided by cloud service providers robust enough to protect sensitive data?
    Is there a lack of proper monitoring and risk assessment tools with cloud security providers to prevent such breaches at the onset?
    Is the data in the cloud protected from both external and internal threats?

    As an organization are you heavily invested in cloud and does this breach concern you? Attend our webinar on 11am EDT on Wednesday August 28th, 2019 to understand critical security controls that must be in place, and how CipherCloud with its industry-leading Zero Trust cloud security, encryption, Digital Rights Management, DLP, UEBA and CSPM capabilities can prevent such data breaches.
  • 5 Steps to Improving Data Protection for Salesforce, ServiceNow and Workday Recorded: Jul 16 2021 59 mins
    Mahesh Rachakonda, VP – Product & Solution Engineering at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Enterprise SaaS apps including Salesforce, ServiceNow, and Workday, among many others, provide critical services to millions of today’s organizations, automating and streamlining workflows while enabling real-time collaboration from any location.

    At the same time, related incidents such as the much-publicized Equifax data breach, continue to create concern as practitioners seek additional security capabilities and best practices that go beyond SaaS apps’ native security controls. Organizations need reassurance that they can apply a zero trust approach to securing cloud information, services and access, invoking layered defenses to prevent against potential threats and data exposure.

    In this best practices webinar, we’ll cover many of the leading SaaS apps security challenges facing today’s organizations, along with key steps that practitioners can utilize to rapidly improve their overall security standing. We’ll specifically dive in to the advanced capabilities of Cloud Access Security Broker (CASB) technologies in addressing these requirements and highlight how the CipherCloud CASB+ platform addresses pertinent questions including:

    - How do I gain 360-degree visibility into cloud user activity, including file uploads and information sharing?
    - How do I detect suspicious user behavior and prevent data loss due to compromised accounts or insider threats?
    - How do I detect and protect sensitive information such as PII, PCI, and PHI data as it travels across cloud apps?
    - How do I differentiate managed and unmanaged devices to enable secure data access and collaboration?
    - How do I ensure compliance with the latest data protection laws such as GDPR, CCPA, and HIPPA?

    Register today to gain valuable insights and best practices for securing your company’s data in leading enterprise SaaS applications.
  • The Policy Predicament - Getting the Most out of Cloud DLP Recorded: Jul 16 2021 60 mins
    Mahesh Rachakonda, VP – Product & Solution Engineering at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Accelerated cloud adoption proved to be the biggest thing that ever happened to data loss prevention (DLP). With so much information finding its way into cloud applications, practitioners had to find a vehicle for active enforcement. In effect, strategic use of email, network, endpoint and other “on-prem” DLP finally became a reality, along with growing adoption of DLP capabilities designed specifically for the cloud.
  • The Top Seven Tips for Securing SAP SuccessFactors Recorded: Jul 16 2021 48 mins
    Madhu Dodda, Senior Manager- Product Management & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Numerous organizations are turning to the SAP SuccessFactors platform to help “manage through disruption” by adopting capabilities spanning Talent Management, HR and Payroll, and related analytics, among others. At the same time, addressing any related risk or security exposure remains a top priority.

    To that end, companies deploying SAP SuccessFactors as their strategic HR and Human Capital Management platform must also include advanced cloud and data security capabilities to protect sensitive data, prevent data exfiltration and maintain regulatory compliance. That’s why leading IT Security and HRIS practitioners have turned to CipherCloud to provide the security, data protection and governance required when embracing cloud HR and HCM.

    In this best practices webinar, join CipherCloud as we highlight the Top Seven Tips for Securing SAP SuccessFactors, spanning key requirements including:
    - Maintaining continuous visibility into applications usage
    - Controlling access from trusted locations and devices
    - Maintaining optimized protection wherever data travels
    - Enforcing policies to ensure compliance [ex. GDPR]
    - Encrypting any protected data with full key control
    - Detecting threats including malware and compromises
    - Performing context-driven forensic investigation

    Register today to learn how the CipherCloud CASB+ solution can accelerate your organization’s use of SuccessFactors HR, Recruiting, Organizational Management and Payroll capabilities.
  • Ecosystème mobile (EDR, UEM, IAM) - Analyse et mise en perspective Lookout Recorded: Jul 6 2021 28 mins
    Bastien Bobe: Security Engineer, Europe du Sud, Lookout
    Série: Comprendre le risque mobile
    Webinaire: 4 / 5

    Focus:
    Complémentarité et la nécessité d’intégrer le MTD dans la politique de sécurité globale afin d’automatiser le traitement du risque mobile dans la stratégie d’entreprise.

    Agenda:
    Rôle, Responsabilité, complémentarité du MTD versus UEM
    Etude de cas réel UEM: Lookout intégré et déployé via un environnement Workspace One UEM, Carbon Black
    Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)

    Intervenants:
    - Bastien Bobe: Security Engineer, Europe du Sud
    - Jean Christophe Prudhomme: Channel Manager, Europe du Sud
  • Les risques liés au divertissement sur mobile Recorded: Jul 6 2021 29 mins
    Bastien Bobe: Security Engineer, Europe du Sud, Lookout
    Focus:
    Les risques involontaires lorsque les mobiles professionnels deviennent aussi des outils de divertissement.

    Agenda:
    - Avec 3 exemples concrets nous verrons comment les employés ou leurs proches mettent en danger leurs données personnelles et professionnelles simplement en jouant.
    - Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)

    Intervenants:
    - Bastien Bobe: Security Engineer, Europe du Sud
    - Jean Christophe Prudhomme: Channel Manager, Europe du Sud
  • Lookout + CipherCloud: La sécurité des services cloud depuis tous vos terminaux Recorded: Jul 6 2021 36 mins
    Bastien Bobe: Sécurité Sales Engineer Europe du Sud, Lookout
    Principales fonctionnalités de la solution SASE développée par Ciphercloud dont Lookout a fait l'acquisition récemment.

    Les solutions CipherCloud couvrent plusieurs technologies SASE, dont Cloud Access Security Broker (CASB), Zero-Trust Network Access (ZTNA), Secure Web Gateway (SWG) et Data Loss Prevention (DLP). Ensemble, ces solutions offrent à la fois une visibilité complète sur la sécurité des données, une protection contre les menaces et la conformité aux réglementations pour les applications basées dans le Cloud.

    Agenda:
    Cas pratiques, comment Lookout sécurise l'utilisation des services cloud quel que soit le terminal, le contexte et le type de données manipulées.

    Intervenants:
    - Bastien Bobe: Sécurité Sales Engineer Europe du Sud
    - Jean Christophe Prudhomme: Channel Manager Europe du Sud
  • Phishing Mobile au-delà de l’email - Analyse et mise en perspective Lookout Recorded: Jul 6 2021 28 mins
    Bastien Bobe: Security Engineer Europe du Sud, Lookout
    Focus:
    Emergence des campagnes de phishing dédiées mobiles exploitant l’actualité (info covid, vaccination, arnaque au faux colis, impôts).

    Agenda:
    - 3 exemples de campagnes de Phishing sur différents médias (SMS, Facebook, Whatsapp)
    - Comment se protéger des attaques de phishing qui ciblent de plus en plus les mobiles?
    - Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)

    Intervenants:
    - Bastien Bobe: Security Engineer Europe du Sud
    - Jean Christophe Prudhomme: Channel Manager Europe du Sud
  • Episode Three: A Business Case for Mobile Security Recorded: Jul 1 2021 32 mins
    Chris Hazelton, Director, Security Solutions, Lookout
    Learn how to make the case for mobile security, and what steps you can take to measurably reduce risks for your organization. Better understand how to protect the critical enterprise productivity tools that live in our pockets.

    Speakers:

    - Chris Hazelton, Director, Security Solutions, Lookout
    - Vincent Sritapan, Cyber QSMO Section Chief, Cybersecurity and Infrastructure Security Agency
    - Naresh Balasubramanian, Director, Information Security & Infrastructure, Washington Post
  • Episode One: Prepare for the next phase of work-anywhere security Recorded: Jun 24 2021 37 mins
    Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    "Fundamentally attackers are trying to get your data, and the way attackers get your data is through your people"
    "Where your people are and how you secure access to data has changed"

    Listen to this 30-minute fireside chat for answers on:

    - How will hybrid-work change security for the long run?
    - How can a Zero Trust approach be used to solve the current security challenges?
    - How do companies adapt their security strategy?
    - Why Lookout extended its product offering to include CASB and ZTNA

    Host
    - Sr. Manager of Security Solutions & host of the Endpoint Enigma podcast

    Speakers
    - Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    - Nick Sears, Vice President of SASE, Lookout
  • Episode One: Prepare for the next phase of work-anywhere security Recorded: Jun 24 2021 37 mins
    Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    "Fundamentally attackers are trying to get your data, and the way attackers get your data is through your people"
    "Where your people are and how you secure access to data has changed"

    Listen to this 30-minute fireside chat for answers on:

    - How will hybrid-work change security for the long run?
    - How can a Zero Trust approach be used to solve the current security challenges?
    - How do companies adapt their security strategy?
    - Why Lookout extended its product offering to include CASB and ZTNA

    Host
    - Sr. Manager of Security Solutions & host of the Endpoint Enigma podcast

    Speakers
    - Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    - Nick Sears, Vice President of SASE, Lookout
  • Episode Two: From the Frontlines: Threats for Your Mobile Fleet Recorded: Jun 17 2021 20 mins
    Aaron Cockerill, Chief Strategy Officer, Lookout
    Hear first hand from industry-leading cybersecurity threat researchers how risks to mobile endpoints are evolving, and how threat actors are targeting mobile accessible cloud services your employees and organization depends on.

    Speakers:
    - Seth Adler, Global Editor In Chief, Cyber Security Hub
    - Aaron Cockerill, Chief Strategy Officer, Lookout
    - Kristin Del Rosso, Senior Security Intelligence Engineer, Lookout
    - Hank Schless, Senior Manager, Security Solutions, Lookout
  • Episode One: Zero Trust? Don't Forget Your Mobile Fleet Recorded: Jun 3 2021 24 mins
    Tomas Maldonado, CISO, NFL Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas
    Does your Zero Trust strategy include mobile devices? If not, it might have zero chance of being successful.

    Tomas Maldonado, CISO, NFL and Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas discuss how to deliver continuous authentication for mobile users connecting to corporate data.
  • A Business Case for Mobile Security Recorded: Mar 25 2021 31 mins
    Chris Hazelton, Director, Security Solutions, Lookout
    Learn how to make the case for mobile security, and what steps you can take to measurably reduce risks for your organization. Better understand how to protect the critical enterprise productivity tools that live in our pockets.

    Speakers:

    - Chris Hazelton, Director, Security Solutions, Lookout
    - Vincent Sritapan, Cyber QSMO Section Chief, Cybersecurity and Infrastructure Security Agency
    - Naresh Balasubramanian, Director, Information Security & Infrastructure, Washington Post
  • A Business Case for Mobile Security Recorded: Mar 25 2021 31 mins
    Chris Hazelton, Director, Security Solutions, Lookout
    Learn how to make the case for mobile security, and what steps you can take to measurably reduce risks for your organization. Better understand how to protect the critical enterprise productivity tools that live in our pockets.

    Speakers:

    - Chris Hazelton, Director, Security Solutions, Lookout
    - Vincent Sritapan, Cyber QSMO Section Chief, Cybersecurity and Infrastructure Security Agency
    - Naresh Balasubramanian, Director, Information Security & Infrastructure, Washington Post
  • Zero Trust? Don't Forget Your Mobile Fleet Recorded: Mar 18 2021 23 mins
    Tomas Maldonado, CISO, NFL Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas
    Does your Zero Trust strategy include mobile devices? If not, it might have zero chance of being successful.

    Tomas Maldonado, CISO, NFL and Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas discuss how to deliver continuous authentication for mobile users connecting to corporate data.
Your data is mobile, why isn’t your security?
Lookout Mobile Endpoint Security provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.
With a seamless integration to your EMM solution, Lookout empowers your organization to adopt secure mobility without compromising productivity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mobile Phishing, the biggest unsolved problem in cybersecurity
  • Live at: Jun 13 2018 9:15 am
  • Presented by: Lookout
  • From:
Your email has been sent.
or close