Hi [[ session.user.profile.firstName ]]

Rapport d’usage des principales applications mobiles en France - Quels risques

Comprendre le risque mobile.

Durant cette 1ere édition de notre série de 4 webinaires nous analyserons une sélection d’applications utilisée tous les jours en France afin de mettre en lumière les challenges de conformité voire de sécurité que représentent l’utilisation de ces applications en environnement mobile professionnel.

Rejoignez nous pour 30 minutes afin d'aborder les points suivants:
- Aperçu du classement des applications les plus utilisées par les français en 2020
- Analyse et synthèse des risques liés à ces applications
- Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)

Intervenants:
- Bastien Bobe: Sécurité Sales Engineer Europe du Sud
- Jean Christophe Prudhomme: Channel Manager Europe du Sud
Recorded Mar 11 2021 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bastien Bobe: Sécurité Sales Engineer Europe du Sud
Presentation preview: Rapport d’usage des principales applications mobiles en France  - Quels risques

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • A Business Case for Mobile Security Recorded: Mar 25 2021 31 mins
    Chris Hazelton, Director, Security Solutions, Lookout
    Learn how to make the case for mobile security, and what steps you can take to measurably reduce risks for your organization. Better understand how to protect the critical enterprise productivity tools that live in our pockets.

    Speakers:

    - Chris Hazelton, Director, Security Solutions, Lookout
    - Vincent Sritapan, Cyber QSMO Section Chief, Cybersecurity and Infrastructure Security Agency
    - Naresh Balasubramanian, Director, Information Security & Infrastructure, Washington Post
  • A Business Case for Mobile Security Recorded: Mar 25 2021 31 mins
    Chris Hazelton, Director, Security Solutions, Lookout
    Learn how to make the case for mobile security, and what steps you can take to measurably reduce risks for your organization. Better understand how to protect the critical enterprise productivity tools that live in our pockets.

    Speakers:

    - Chris Hazelton, Director, Security Solutions, Lookout
    - Vincent Sritapan, Cyber QSMO Section Chief, Cybersecurity and Infrastructure Security Agency
    - Naresh Balasubramanian, Director, Information Security & Infrastructure, Washington Post
  • Zero Trust? Don't Forget Your Mobile Fleet Recorded: Mar 18 2021 23 mins
    Tomas Maldonado, CISO, NFL Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas
    Does your Zero Trust strategy include mobile devices? If not, it might have zero chance of being successful.

    Tomas Maldonado, CISO, NFL and Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas discuss how to deliver continuous authentication for mobile users connecting to corporate data.
  • Zero Trust? Don't Forget Your Mobile Fleet Recorded: Mar 18 2021 23 mins
    Tomas Maldonado, CISO, NFL Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas
    Does your Zero Trust strategy include mobile devices? If not, it might have zero chance of being successful.

    Tomas Maldonado, CISO, NFL and Ramy Houssaini, Chief Cyber & Technology Risk Officer & Group Privacy Officer, BNP Paribas discuss how to deliver continuous authentication for mobile users connecting to corporate data.
  • From the Frontlines: Threats for Your Mobile Fleet Recorded: Mar 11 2021 19 mins
    Aaron Cockerill, Chief Strategy Officer, Lookout
    Hear first hand from industry-leading cybersecurity threat researchers how risks to mobile endpoints are evolving, and how threat actors are targeting mobile accessible cloud services your employees and organization depends on.

    Speakers:
    - Seth Adler, Global Editor In Chief, Cyber Security Hub
    - Aaron Cockerill, Chief Strategy Officer, Lookout
    - Kristin Del Rosso, Senior Security Intelligence Engineer, Lookout
    - Hank Schless, Senior Manager, Security Solutions, Lookout
  • Comprendere i rischi del BYOD e come proteggersi Recorded: Mar 11 2021 40 mins
    Alessio Giorgi, Mobile Security Expert, Lookout
    Una situazione unica nel suo genere finora ha costretto le aziende a consentire rapidamente l’accesso remoto per garantire la continuità del business. Rispetto allo scorso anno, un numero molto superiore di endpoint personali accedono alle infrastrutture aziendali.

    I dispositivi mobili personali sono diventati il nuovo telefono fisso, i dipendenti stanno scambiando dati sensibili tramite le chat di gruppo di WhatsApp e l’accesso alle app aziendali come e-mail, Salesforce e cartelle condivise nel cloud è aumentato.

    Gli hacker hanno spostato investimenti e sforzi prendendo di mira gli endpoint mobili al di fuori del tradizionale perimetro di sicurezza aziendale, mettendo le organizzazioni a maggior rischio di violazione.

    In questo webinar scopriremo:
    • Le minacce mobili che si possono incontrare
    • Una guida per la protezione dei lavoratori remoti
    • Come abilitare in modo sicuro il BYOD
    • In che modo Lookout protegge la tua flotta mobile
  • Rapport d’usage des principales applications mobiles en France - Quels risques Recorded: Mar 11 2021 40 mins
    Bastien Bobe: Sécurité Sales Engineer Europe du Sud
    Comprendre le risque mobile.

    Durant cette 1ere édition de notre série de 4 webinaires nous analyserons une sélection d’applications utilisée tous les jours en France afin de mettre en lumière les challenges de conformité voire de sécurité que représentent l’utilisation de ces applications en environnement mobile professionnel.

    Rejoignez nous pour 30 minutes afin d'aborder les points suivants:
    - Aperçu du classement des applications les plus utilisées par les français en 2020
    - Analyse et synthèse des risques liés à ces applications
    - Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)

    Intervenants:
    - Bastien Bobe: Sécurité Sales Engineer Europe du Sud
    - Jean Christophe Prudhomme: Channel Manager Europe du Sud
  • From the Frontlines: Threats for Your Mobile Fleet Recorded: Mar 11 2021 19 mins
    Aaron Cockerill, Chief Strategy Officer, Lookout
    Hear first hand from industry-leading cybersecurity threat researchers how risks to mobile endpoints are evolving, and how threat actors are targeting mobile accessible cloud services your employees and organization depends on.

    Speakers:
    - Seth Adler, Global Editor In Chief, Cyber Security Hub
    - Aaron Cockerill, Chief Strategy Officer, Lookout
    - Kristin Del Rosso, Senior Security Intelligence Engineer, Lookout
    - Hank Schless, Senior Manager, Security Solutions, Lookout
  • Why Managing your Mobile Endpoints is not Securing your Mobile Endpoints Recorded: Jul 21 2020 37 mins
    Chris Hazelton Director, Product Marketing and Security Solutions
    With employees accessing sensitive business data from mobile devices, many organizations deploy Mobile Device Management (MDM) believing this protects them from cybersecurity threats.

    Your mobile employees are now prime targets for phishing, application, and other threats that management tools cannot protect against. Learn how to protect your users, your corporate data, and your organization from the latest cybersecurity threats.

    Register to this webinar to learn about:

    - The strengths and weaknesses of mobile device management (MDM).
    - What threats mobile management tools are blind to.
    - How to apply dynamic security protections for all mobile users of cloud data.
  • Why Managing your Mobile Endpoints is not Securing your Mobile Endpoints Recorded: Jul 21 2020 37 mins
    Chris Hazelton Director, Product Marketing and Security Solutions
    With employees accessing sensitive business data from mobile devices, many organizations deploy Mobile Device Management (MDM) believing this protects them from cybersecurity threats.

    Your mobile employees are now prime targets for phishing, application, and other threats that management tools cannot protect against. Learn how to protect your users, your corporate data, and your organization from the latest cybersecurity threats.

    Register to this webinar to learn about:

    - The strengths and weaknesses of mobile device management (MDM).
    - What threats mobile management tools are blind to.
    - How to apply dynamic security protections for all mobile users of cloud data.
  • Understand mobile risk: Lookout Mobile Threat Defense Recorded: Jun 9 2020 46 mins
    Marius Rohart, Security Sales Engineer EMEA, Lookout
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Understand mobile risk: Lookout Mobile Threat Defense Recorded: Jun 9 2020 46 mins
    Marius Rohart, Security Sales Engineer EMEA, Lookout
    Enterprises must securely enable employees to work remotely.

    More and more enterprises recognise the need to allow employees to work remotely. However, as mobile access to cloud resources increase, data is exposed to cyber threats such as phishing, unreliable Wi-Fi networks and social engineering attacks.

    Join Lookout for this 30-minute webinar where we will cover:

    - The mobile threat landscape
    - How to securely enable a remote workforce
    - How to protect cloud data from phishing and social engineering attacks
    - How Lookout provides visibility into mobile threats
  • Phishing Threats in a Mobile-Enabled World Recorded: Jun 2 2020 37 mins
    Chris Hazelton, Director Security Solutions, Lookout
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • Phishing Threats in a Mobile-Enabled World Recorded: Jun 2 2020 37 mins
    Chris Hazelton, Director Security Solutions, Lookout
    Your employees work differently now. Employees are working outside of their offices and outside of the protection of security measures. Couple this with the usage of primarily mobile devices and it opens a whole new door of vulnerabilities that organisations need to consider. Namely, phishing threats.

    Register to join Chris Hazelton Director, Security Solutions of Lookout to learn:
    • How attacks have evolved
    • Common mobile phishing attacks
    • Ways to thwart threats within your organization
    • Protecting your network inside and outside enterprise perimeters
  • Best Practices for Securing Your Remote Workers Recorded: May 26 2020 53 mins
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Best Practices for Securing Your Remote Workers Recorded: May 26 2020 53 mins
    David Richardson, VP Product Management, Lookout & Chris Hazelton Director, Security Solutions, Lookout
    As organisations enable employees to work remotely, mobile devices and wireless networks will be key tools for maintaining communication and remaining productive.

    However, allowing employees to work productively from any device and any location can open organisations up to cyber risk.

    Join this webinar to learn:

    - The most critical considerations for allowing personal devices to access corporate resources
    - What rights should be granted for devices accessing corporate data
    - How to control specific operating systems from gaining unauthorised access
    - What guidance to give users to remain productive and secure while working remotely
  • Protect against phishing threats in a post-perimeter world Recorded: Feb 3 2020 51 mins
    Aaron Cockerill, Chief Strategy Officer, Lookout
    As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:

    - The latest tactics attackers are using to exfiltrate enterprise data
    - Why phishing is more problematic and successful on mobile
    - How to identify if an employee device has been phished
    - How to remain compliant by reducing cyber risk from mobile endpoints
  • Protect against phishing threats in a post-perimeter world Recorded: Jan 27 2020 51 mins
    Aaron Cockerill, Chief Strategy Officer, Lookout
    As phishing attacks evolve, organisations must protect corporate data in the cloud. Register for this exclusive webinar now to learn:

    - The latest tactics attackers are using to exfiltrate enterprise data
    - Why phishing is more problematic and successful on mobile
    - How to identify if an employee device has been phished
    - How to remain compliant by reducing cyber risk from mobile endpoints
  • Mobile Phishing – Myths and facts facing every modern enterprise Recorded: Jan 9 2020 38 mins
    Marielle Hagblad, Lookout Mobile Security Engineer
    Phishing on mobile is the biggest unsolved cybersecurity problem in the enterprise today. This is because phishing is both different and more problematic on the mobile device.

    As a result, mobile users are three times more likely to fall for phishing scams.

    In this webinar, our security expert Marielle Hagblad will shed a light on the risks of mobile phishing and the facts that will help you make informed decisions to protect corporate data.

    Myths or Facts?
    - Existing phishing protection covers mobile devices.
    - Phishing attacks only occur on email.

    Join this webinar to find out.
  • Believe there are no threats from mobile endpoints? Recorded: Nov 28 2019 27 mins
    Jeroen Wijdogen, Enterprise Security Sales Engineer
    Employees work differently now, accessing enterprise data from mobile devices in airports, on public transport and the local coffee shop. Cyber opportunists have taken note, focusing attacks on iOS and Android devices via phishing, apps, device, and network.

    According to the Verizon Mobile Security Index 2019, “33% of companies admitted to having suffered a compromise involving a mobile device and the majority of those affected said that the impact was major.”

    It’s not that the threats aren’t there, it’s that most organisations don’t have visibility into them.

    Watch this webinar to learn:

    - What mobile threats your organisation needs to protect against
    - Why your security strategy needs to adapt to the mobile world
    - How to reduce the risk of a data breach from mobile endpoints with Lookout
Your data is mobile, why isn’t your security?
Lookout Mobile Endpoint Security provides comprehensive risk management across iOS and Android devices to secure against app, device, and network-based threats while providing visibility and control over data leakage.
With a seamless integration to your EMM solution, Lookout empowers your organization to adopt secure mobility without compromising productivity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Rapport d’usage des principales applications mobiles en France - Quels risques
  • Live at: Mar 11 2021 9:00 am
  • Presented by: Bastien Bobe: Sécurité Sales Engineer Europe du Sud
  • From:
Your email has been sent.
or close