Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.
Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
• How attacks have evolved
• Common mobile phishing attacks
• Ways to thwart threats within your organization
• Protecting your network inside and outside enterprise perimeters
RecordedJun 2 202037 mins
Your place is confirmed, we'll send you email reminders
Chris Hazelton, Director, Security Solutions, Lookout
Learn how to make the case for mobile security, and what steps you can take to measurably reduce risks for your organization. Better understand how to protect the critical enterprise productivity tools that live in our pockets.
Speakers:
- Chris Hazelton, Director, Security Solutions, Lookout
- Vincent Sritapan, Cyber QSMO Section Chief, Cybersecurity and Infrastructure Security Agency
- Naresh Balasubramanian, Director, Information Security & Infrastructure, Washington Post
Chris Hazelton, Director, Security Solutions, Lookout
Learn how to make the case for mobile security, and what steps you can take to measurably reduce risks for your organization. Better understand how to protect the critical enterprise productivity tools that live in our pockets.
Speakers:
- Chris Hazelton, Director, Security Solutions, Lookout
- Vincent Sritapan, Cyber QSMO Section Chief, Cybersecurity and Infrastructure Security Agency
- Naresh Balasubramanian, Director, Information Security & Infrastructure, Washington Post
Tomas Maldonado, CISO, NFL Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas
Does your Zero Trust strategy include mobile devices? If not, it might have zero chance of being successful.
Tomas Maldonado, CISO, NFL and Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas discuss how to deliver continuous authentication for mobile users connecting to corporate data.
Tomas Maldonado, CISO, NFL Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas
Does your Zero Trust strategy include mobile devices? If not, it might have zero chance of being successful.
Tomas Maldonado, CISO, NFL and Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas discuss how to deliver continuous authentication for mobile users connecting to corporate data.
Hear first hand from industry-leading cybersecurity threat researchers how risks to mobile endpoints are evolving, and how threat actors are targeting mobile accessible cloud services your employees and organization depends on.
Una situazione unica nel suo genere finora ha costretto le aziende a consentire rapidamente l’accesso remoto per garantire la continuità del business. Rispetto allo scorso anno, un numero molto superiore di endpoint personali accedono alle infrastrutture aziendali.
I dispositivi mobili personali sono diventati il nuovo telefono fisso, i dipendenti stanno scambiando dati sensibili tramite le chat di gruppo di WhatsApp e l’accesso alle app aziendali come e-mail, Salesforce e cartelle condivise nel cloud è aumentato.
Gli hacker hanno spostato investimenti e sforzi prendendo di mira gli endpoint mobili al di fuori del tradizionale perimetro di sicurezza aziendale, mettendo le organizzazioni a maggior rischio di violazione.
In questo webinar scopriremo:
• Le minacce mobili che si possono incontrare
• Una guida per la protezione dei lavoratori remoti
• Come abilitare in modo sicuro il BYOD
• In che modo Lookout protegge la tua flotta mobile
Bastien Bobe: Sécurité Sales Engineer Europe du Sud
Comprendre le risque mobile.
Durant cette 1ere édition de notre série de 4 webinaires nous analyserons une sélection d’applications utilisée tous les jours en France afin de mettre en lumière les challenges de conformité voire de sécurité que représentent l’utilisation de ces applications en environnement mobile professionnel.
Rejoignez nous pour 30 minutes afin d'aborder les points suivants:
- Aperçu du classement des applications les plus utilisées par les français en 2020
- Analyse et synthèse des risques liés à ces applications
- Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)
Intervenants:
- Bastien Bobe: Sécurité Sales Engineer Europe du Sud
- Jean Christophe Prudhomme: Channel Manager Europe du Sud
Hear first hand from industry-leading cybersecurity threat researchers how risks to mobile endpoints are evolving, and how threat actors are targeting mobile accessible cloud services your employees and organization depends on.
Chris Hazelton Director, Product Marketing and Security Solutions
With employees accessing sensitive business data from mobile devices, many organizations deploy Mobile Device Management (MDM) believing this protects them from cybersecurity threats.
Your mobile employees are now prime targets for phishing, application, and other threats that management tools cannot protect against. Learn how to protect your users, your corporate data, and your organization from the latest cybersecurity threats.
Register to this webinar to learn about:
- The strengths and weaknesses of mobile device management (MDM).
- What threats mobile management tools are blind to.
- How to apply dynamic security protections for all mobile users of cloud data.
Chris Hazelton Director, Product Marketing and Security Solutions
With employees accessing sensitive business data from mobile devices, many organizations deploy Mobile Device Management (MDM) believing this protects them from cybersecurity threats.
Your mobile employees are now prime targets for phishing, application, and other threats that management tools cannot protect against. Learn how to protect your users, your corporate data, and your organization from the latest cybersecurity threats.
Register to this webinar to learn about:
- The strengths and weaknesses of mobile device management (MDM).
- What threats mobile management tools are blind to.
- How to apply dynamic security protections for all mobile users of cloud data.
Marius Rohart, Security Sales Engineer EMEA, Lookout
Enterprises must securely enable employees to work remotely.
More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.
Join Lookout for this 30-minute webinar where we will cover:
- The mobile threat landscape
- How to securely enable a remote workforce
- How to protect cloud data from phishing and social engineering attacks
- How Lookout provides visibility into mobile threats
Marius Rohart, Security Sales Engineer EMEA, Lookout
Enterprises must securely enable employees to work remotely.
More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.
Join Lookout for this 30-minute webinar where we will cover:
- The mobile threat landscape
- How to securely enable a remote workforce
- How to protect cloud data from phishing and social engineering attacks
- How Lookout provides visibility into mobile threats
Chris Hazelton, Director Security Solutions, Lookout
Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.
Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
• How attacks have evolved
• Common mobile phishing attacks
• Ways to thwart threats within your organization
• Protecting your network inside and outside enterprise perimeters
Chris Hazelton, Director Security Solutions, Lookout
Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.
Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
• How attacks have evolved
• Common mobile phishing attacks
• Ways to thwart threats within your organization
• Protecting your network inside and outside enterprise perimeters
David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout
As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.
However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.
Join this webinar to learn:
- The most critical considerations for allowing personal devices to access corporate resources
- What rights should be granted for devices accessing corporate data
- How to control specific operating systems from gaining unauthorised access
- What guidance to give users to remain productive and secure while working remotely
David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout
As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.
However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.
Join this webinar to learn:
- The most critical considerations for allowing personal devices to access corporate resources
- What rights should be granted for devices accessing corporate data
- How to control specific operating systems from gaining unauthorised access
- What guidance to give users to remain productive and secure while working remotely
As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:
- The latest tactics attackers are using to exfiltrate enterprise data
- Why phishing is more problematic and successful on mobile
- How to identify if an employee device has been phished
- How to remain compliant by reducing cyber risk from mobile endpoints
As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:
- The latest tactics attackers are using to exfiltrate enterprise data
- Why phishing is more problematic and successful on mobile
- How to identify if an employee device has been phished
- How to remain compliant by reducing cyber risk from mobile endpoints
Marielle Hagblad, Lookout Mobile Security Engineer
Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is because phishing is both different and more problematic on the mobile device.
As a result, mobile users are three times more likely to fall for phishing scams.
In this webinar, our security expert Marielle Hagblad will shed a light on the risks of mobile phishing and the facts that will help you make informed decisions to protect corporate data.
Myths or Facts?
- Existing phishing protection covers mobile devices.
- Phishing attacks only occur on email.
Employees work differently now, accessing enterprise data from mobile devices in airports, on public transport and the local coffee shop. Cyber opportunists have taken note, focusing attacks on iOS and Android devices via phishing, apps, device, and network.
According to the Verizon Mobile Security Index 2019, “33% of companies admitted to having suffered a compromise involving a mobile device and the majority of those affected said that the impact was major.”
It’s not that the threats aren’t there, it’s that most organisations don’t have visibility into them.
Watch this webinar to learn:
- What mobile threats your organisation needs to protect against
- Why your security strategy needs to adapt to the mobile world
- How to reduce the risk of a data breach from mobile endpoints with Lookout
Lookout Mobile Endpoint Security provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.
With a seamless integration to your EMM solution, Lookout empowers your organization to adopt secure mobility without compromising productivity.
Phishing Threats in a Mobile-Enabled WorldChris Hazelton, Director Security Solutions, Lookout[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]37 mins