Hi [[ session.user.profile.firstName ]]

Best Practices for Securing Your Remote Workers

As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

Join this webinar to learn:

- The most critical considerations for allowing personal devices to access corporate resources
- What rights should be granted for devices accessing corporate data
- How to control specific operating systems from gaining unauthorised access
- What guidance to give users to remain productive and secure while working remotely
Recorded May 26 2020 53 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout
Presentation preview: Best Practices for Securing Your Remote Workers

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Why Managing your Mobile Endpoints is not Securing your Mobile Endpoints Jul 21 2020 9:00 am UTC 37 mins
    Chris Hazelton Director, Product Marketing and Security Solutions
    With employees accessing sensitive business data from mobile devices, many organizations deploy Mobile Device Management (MDM) believing this protects them from cybersecurity threats.

    Your mobile employees are now prime targets for phishing, application, and other threats that management tools cannot protect against. Learn how to protect your users, your corporate data, and your organization from the latest cybersecurity threats.

    Register to this webinar to learn about:

    - The strengths and weaknesses of mobile device management (MDM).
    - What threats mobile management tools are blind to.
    - How to apply dynamic security protections for all mobile users of cloud data.
  • Why Managing your Mobile Endpoints is not Securing your Mobile Endpoints Jul 21 2020 12:00 am UTC 37 mins
    Chris Hazelton Director, Product Marketing and Security Solutions
    With employees accessing sensitive business data from mobile devices, many organizations deploy Mobile Device Management (MDM) believing this protects them from cybersecurity threats.

    Your mobile employees are now prime targets for phishing, application, and other threats that management tools cannot protect against. Learn how to protect your users, your corporate data, and your organization from the latest cybersecurity threats.

    Register to this webinar to learn about:

    - The strengths and weaknesses of mobile device management (MDM).
    - What threats mobile management tools are blind to.
    - How to apply dynamic security protections for all mobile users of cloud data.
  • Understand mobile risk: Lookout Mobile Threat Defense Recorded: Jun 9 2020 46 mins
    Marius Rohart, Security Sales Engineer EMEA, Lookout
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Understand mobile risk: Lookout Mobile Threat Defense Recorded: Jun 9 2020 46 mins
    Marius Rohart, Security Sales Engineer EMEA, Lookout
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Phishing Threats in a Mobile-Enabled World Recorded: Jun 2 2020 37 mins
    Chris Hazelton, Director Security Solutions, Lookout
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • Phishing Threats in a Mobile-Enabled World Recorded: Jun 2 2020 37 mins
    Chris Hazelton, Director Security Solutions, Lookout
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • Best Practices for Securing Your Remote Workers Recorded: May 26 2020 53 mins
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Best Practices for Securing Your Remote Workers Recorded: May 26 2020 53 mins
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Protect against phishing threats in a post-perimeter world Recorded: Feb 3 2020 51 mins
    Aaron Cockerill, Chief Strategy Officer, Lookout
    As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:

    - The latest tactics attackers are using to exfiltrate enterprise data
    - Why phishing is more problematic and successful on mobile
    - How to identify if an employee device has been phished
    - How to remain compliant by reducing cyber risk from mobile endpoints
  • Protect against phishing threats in a post-perimeter world Recorded: Jan 27 2020 51 mins
    Aaron Cockerill, Chief Strategy Officer, Lookout
    As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:

    - The latest tactics attackers are using to exfiltrate enterprise data
    - Why phishing is more problematic and successful on mobile
    - How to identify if an employee device has been phished
    - How to remain compliant by reducing cyber risk from mobile endpoints
  • Mobile Phishing – Myths and facts facing every modern enterprise Recorded: Jan 9 2020 38 mins
    Marielle Hagblad, Lookout Mobile Security Engineer
    Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is because phishing is both different and more problematic on the mobile device.

    As a result, mobile users are three times more likely to fall for phishing scams.

    In this webinar, our security expert Marielle Hagblad will shed a light on the risks of mobile phishing and the facts that will help you make informed decisions to protect corporate data.

    Myths or Facts?
    - Existing phishing protection covers mobile devices.
    - Phishing attacks only occur on email.

    Join this webinar to find out.
  • Believe there are no threats from mobile endpoints? Recorded: Nov 28 2019 27 mins
    Jeroen Wijdogen, Enterprise Security Sales Engineer
    Employees work differently now, accessing enterprise data from mobile devices in airports, on public transport and the local coffee shop. Cyber opportunists have taken note, focusing attacks on iOS and Android devices via phishing, apps, device, and network.

    According to the Verizon Mobile Security Index 2019, “33% of companies admitted to having suffered a compromise involving a mobile device and the majority of those affected said that the impact was major.”

    It’s not that the threats aren’t there, it’s that most organisations don’t have visibility into them.

    Watch this webinar to learn:

    - What mobile threats your organisation needs to protect against
    - Why your security strategy needs to adapt to the mobile world
    - How to reduce the risk of a data breach from mobile endpoints with Lookout
  • Mobile Security and the Future of Work Recorded: Aug 27 2019 23 mins
    Phil Hochmuth, Program Vice President, Enterprise Mobility at IDC
    Learn more about risks and challenges supporting mobile users from guest speaker IDC’s Phil Hochmuth, Program Vice President, Enterprise Mobility as he discusses:

    - Key drivers for how cloud and mobility are improving employee productivity
    - How organizations are preparing for digital transformation
    - What challenges organizations are facing across security, integration, and costs
    - What are the key mobile threats that organizations are seeing
    - How are organizations addressing these threats


    SPEAKERS
    Phil Hochmuth
    IDC, Program Vice President, Enterprise Mobility
  • Post Perimeter Security 101 - Protecting a border-less world Recorded: Jan 22 2019 29 mins
    Aaron Cockerill, Chief Strategy Officer
    What is currently happening the world of security?

    Gartner predicts that 80% of worker tasks will take place on a mobile device by 2020.*

    The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations enforce their endpoints and establish continuous conditional access to data based on risk.

    During this webinar Aaron Cockrill, CSO at Lookout will talk about:

    - What does a post-perimeter world mean to enterprise security?
    - Why mobility changes the enterprise security paradigm?
    - How to protect data when accessed from outside the corporate perimeter?
    - What are the current and emerging threats?

    * Source Gartner, "Prepare for Unified Endpoint Management to Displace MDM and CMT" June 2018
  • Mobile Threat Management: Addressing endpoint security’s biggest blind spot Recorded: Jan 14 2019 41 mins
    Phil Hochmuth, Program Director, Enterprise Mobility at IDC
    Lookout invited a special guest, Phil Hochmuth, Program Director, Enterprise Mobility at IDC to talk about the rising implications of employees accessing business data and apps with smartphones.

    On the agenda:

    - The latest research in enterprise mobility adoption

    - Security and the top challenges sourced by IDC

    - How mobile threat management fits into an enterprise endpoint security architecture
  • The Evolution of Mobile Threat Actors Recorded: Jul 19 2018 37 mins
    Michael Flossman, Head of Threat Intelligence, Lookout
    Cybercriminals and nation states are consistently using mobile threat tooling as part of their espionage or financially motivated attacks and campaigns. The Lookout Threat Intelligence team has noticed this increase as we research and protect against these adversaries. These actors are increasingly seeing value from having an offensive mobile capability in their toolkit and we have even seen low sophistication groups break into this space and successfully steal gigabytes of data from compromised devices. As BYOD and the prevalence of mobile devices in corporate environments continue to blur the traditional enterprise perimeter, the ability to understand the risks to mobile endpoints is critical.

    Join Michael Flossman, Head of Threat Intelligence at Lookout, for this informative webinar as he covers the evolution of threat actors on mobile, discusses several recent high-profile cases, and explains why gaining visibility into your mobile endpoints and proactively securing them is key for today’s organizations."
  • Mobile phishing 2018: A look at mobile threats now facing every enterprise Recorded: Jul 10 2018 37 mins
    Jeremy Richards, Principal Security Engineer
    Mobile phishing has grown by 85 percent year over year since 2011. These attacks are a top priority for enterprise business today.

    Our research into mobile phishing has uncovered a number of malicious actors that exploit the mobile platform—unleashing such well-publicized mobile threats as Pegasus, Dark Caracal, FrozenCell, xRAT, ViperRAT, SocialPath, and Xsser/mRAT.

    Watch the webcast to learn:
    - How mobile phishing works
    - How mobile phishing threatens the security of your enterprise
    - What you can do to protect your organization
  • Mobile Phishing, the biggest unsolved problem in cybersecurity Recorded: Jun 13 2018 1 min
    Lookout
    It only takes one errant tap to compromise a mobile device. This short video clip highlights the threats and how inconspicuous a phishing attack on a mobile device can be. You will also be able to download our latest whitepaper to understand mobile phishing facts that will help you make informed decisions on how to protect corporate data.
  • GDPR compliance on mobile devices, how secure is your organization? Recorded: May 29 2018 50 mins
    Aaron Cockerill, Chief Strategy Officer, Lookout
    Since 25 May, the General Data Protection Regulation (GDPR) is now officially enforceable. By now, most of the companies dealing with data should have taken the necessary steps to comply with the regulation and stay out of trouble. And this is all good but, have you thought about how your employees are using their mobile phones or devices to access your company data? How do you protect your organization from an employee's phone being hacked? The risk of GDPR fines & brand reputation damage has made the security of personal data on mobile an urgent priority for CISOs, and executive boards.

    By popular demand, we're replaying this webinar hosted by Aaron Cockerill, Chief Strategy Officer at Lookout and his guest, Kabir Barday, CEO at OneTrust.

    On the agenda:
    - Why mobile is a problem for GDPR compliance
    - Understanding the threats & risks to GDPR compliance from mobile
    - Finding & stopping mobile threats to GDPR compliance

    Did you know?

    84% of security & IT executives say personal data accessed on employee mobile devices could put their company at risk for GDPR noncompliance.

    31% of enterprise employees that have a title of Vice President or higher say their mobile devices have been hacked or compromised.

    63% of enterprise employees say they access their organization's customer, partner, data and employee data while on their mobile device.
  • CISO Top Security Priorities: Why Visibility Into Mobile Risk Is Critical Recorded: Apr 17 2018 29 mins
    Aaron Cockerill - Chief Strategy Officer, Lookout
    According to a recent survey, 75% of today’s security professionals believe their organizations need to increase visibility into mobile risks.

    With a spectrum of issues facing the mobile enterprise – including targeted attacks, disruptive malware, and noncompliant data-leaking apps – it is critical to understand the full range of threats and vulnerabilities, especially as organizations begin to prepare for GDPR compliance.

    Watch the webinar to:

    - Get visibility into the full spectrum of mobile risk and the latest security intelligence

    - Dive into IDG’s “Security Priorities 2017” latest research to hear about what is at the top of the CISOs agenda

    - Hear real-world scenarios about what organizations are doing today to secure their mobile devices

    - Learn how to protect personal data on mobile to prepare for GDPR compliance in May 2018


    SPEAKERS
    Bob Bragdon - SVP & Publisher, IDG/CSOonline.com
    Aaron Cockerill - Chief Strategy Officer, Lookout
Your data is mobile, why isn’t your security?
Lookout Mobile Endpoint Security provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.
With a seamless integration to your EMM solution, Lookout empowers your organization to adopt secure mobility without compromising productivity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Best Practices for Securing Your Remote Workers
  • Live at: May 26 2020 9:00 am
  • Presented by: David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout
  • From:
Your email has been sent.
or close