Hi [[ session.user.profile.firstName ]]

Episode Two: From the Frontlines: Threats for Your Mobile Fleet

Hear first hand from industry-leading cybersecurity threat researchers how risks to mobile endpoints are evolving, and how threat actors are targeting mobile accessible cloud services your employees and organization depends on.

Speakers:
- Seth Adler, Global Editor In Chief, Cyber Security Hub
- Aaron Cockerill, Chief Strategy Officer, Lookout
- Kristin Del Rosso, Senior Security Intelligence Engineer, Lookout
- Hank Schless, Senior Manager, Security Solutions, Lookout
Recorded Jun 17 2021 20 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Aaron Cockerill, Chief Strategy Officer, Lookout
Presentation preview: Episode Two: From the Frontlines: Threats for Your Mobile Fleet

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cloud applications: A Zero Trust approach to security in Healthcare Recorded: Sep 3 2021 57 mins
    Nick Sears, Vice President of SASE, Lookout
    Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable both employees and patients to access data from anywhere. Compound this use of managed and unmanaged mobile devices in a world where the network perimeter is being eroded and you have a real challenge at hand.

    Join the Lookout team today to find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – regardless of SaaS, IaaS or on-premises application.

    AGENDA:

    Zero Trust - How to apply a dynamic and contextual approach to applications and data access in the cloud.
    Data Protection and DLP for preventing data loss - Using advanced DLP to ensure data is protected against inappropriate upload, download and sharing.
    Threat Prevention and Anomaly Detection - Gain deep visibility into user activity across all cloud applications and prevent malware and associated risks.
    Audit and Compliance - How to administer a common security policy and investigate for real-time compliance across SaaS apps and platforms.
    Lookout CASB+ and ZTNA platform - Interactive demo.
  • Schneider Electric Secures 50,000 Devices with Lookout Recorded: Sep 2 2021 7 mins
    Simon Hardy-Bistagne, Director - Digital Workplace Architecture & Innovation at Schneider Electric
    Simon Hardy-Bistagne, Director - Digital Workplace Architecture & Innovation at Schneider Electric joins Aaron Cockerill, Chief Strategy Officer at Lookout on stage at the Gartner Symposium/ITxpo to discuss how Schneider Electric secures mobile users and devices accessing corporate data.
  • Episode Four: Guilty until proven innocent - Playing by Zero Trust laws Recorded: Sep 2 2021 32 mins
    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief, Defense Intelligence Agency
    Users and endpoints are being targeted by security threats from all angles, is a Zero Trust security strategy the answer?

    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief of the Defense Intelligence Agency will join Lookout for the final episode of our Achieving Endpoint-to-Cloud Security series.

    Learn how Tyler helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats, as she answers:

    - What cyberattacks stand out and how have threats evolved?
    - Could a Zero Trust mindset have prevented previous security breaches from happening?
    - Why losing your smartphone is much riskier than losing your wallet?
    - What practices enterprises and government organizations can put in place to reduce phishing risk?
  • Episode Two: Prevent data leakage from productivity tools Recorded: Sep 1 2021 29 mins
    Sundaram Lakshmanan, CTO, SASE Products at Lookout
    Lookout's CTO of SASE Products, Sundaram Lakshmanan invites you and your colleagues to join him to discuss how to evolve your security strategy to prevent data loss.

    Whether an employee downloads a sensitive file or accidentally shares it with unapproved users, preventing leakage of confidential data through productivity tools is a necessity for the modern, connected enterprise.

    Watch this webinar to learn:

    - How Data Loss Prevention (DLP) technology has grown from what we've always known into what it is today.
    - How the application of DLP has changed in reaction to continuously evolving infrastructure.
    - How you can remediate DLP issues and challenges your organization is facing.
  • Security from Endpoint to Cloud Recorded: Aug 27 2021 21 mins
    Aaron Cockerill, Chief Strategy Officer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. To securely tap into this productivity you need a Secure Access Service Edge (SASE), delivering data protection in the cloud like you still have a perimeter. But existing SASE technologies are invasive and clash with the users expectation of privacy when working remotely. It’s only when you integrate endpoint security with SASE that you can protect data in a manner that respects personal privacy.

    Watch this session with Aaron Cockerill, Chief Strategy Officer at Lookout to learn why you need integrated endpoint-to-cloud security to safeguard your data while complying with regulations and respecting personal privacy.
  • What are the risks series 3/4:Australia's Game & Entertainment on Mobile Devices Recorded: Aug 17 2021 49 mins
    Zoran Pupovac
    In this 3rd edition of our 4-part webinar series we highlight the unintentional risk-taking of our employees (or their children) when business mobiles also become entertainment tools.
    Content
    - With 3 concrete examples we will see how employees or their family members put their personal and professional data at risk simply by playing.
    - Overview of mobile risks and how to protect against them (Malware, advanced compromise, phishing and network attacks)
  • What are the risks series 2/4: Australia's Mobile Phishing Beyond Email Recorded: Aug 17 2021 45 mins
    Zoran Pupovac
    During this 2nd edition of our 4 webinar series, we highlight the emergence of dedicated mobile phishing campaigns exploiting current events (covid info, vaccination, fake package scam, taxes).
    Content:
    - Three examples of Phishing campaigns on different media (SMS, Facebook, Whatsapp)
    - How to protect yourself from phishing attacks that are increasingly targeting mobiles?
    - Overview of mobile risks and how to protect against them (Malware, advanced compromise, phishing and network attacks)
  • What are the risks series 1/4: Australia's most downloaded applications Recorded: Jul 21 2021 41 mins
    Zoran Pupovac
    Report based on the most common downloaded mobile applications used in Australia.
    We will analyse the most common downloaded mobile applications used every day in Australia, in order to highlight the compliance and security challenges.
    Agenda:
    1) Overview and ranking of the most used applications by Australians in 2020
    2) Analysis and summary of the risks associated with these applications
    3) Overview of mobile risks and how to protect against them (Malware, advanced compromise, phishing and network attacks)
  • Identify and remediate misconfigurations in Salesforce and Office 365 Recorded: Jul 16 2021 35 mins
    Mahesh Rachakonda, Vice President – Product & Solution Engineering at CipherCloud
    Cloud adoption is on the rise. Organizations are tapping to the unlimited supply of on-demand servers and services for business transformation and remote collaboration at reduced operational expenditure.

    But the skillset of IT teams is unable to match an organization's growing cloud portfolio. Difficulty in maintaining simultaneous visibility across all cloud apps creates a huge security gap, leaving the clouds susceptible to threats and breaches due to security and access misconfigurations.

    Join us for a webinar session on July 9, 2020, at 9 AM PDT to understand how CipherCloud’s Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) perform an automated assessment of your IaaS and SaaS landscape against well-defined security guidelines, reducing the operational complexity in managing multiple apps, preventing data loss from misconfigurations and ensuring compliance in a multi-cloud environment.
  • Best Practices: Operationalizing Security for O365 Collaboration Recorded: Jul 16 2021 51 mins
    Madhu Dodda, Senior Manager- Product Management & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    With the remote workforce becoming the norm for many organizations and adoption of Microsoft’s Teams and Office 365 platform growing at a furious pace, today’s security practitioners face a complex set of challenges as they seek to enable cloud collaboration while protecting sensitive data.

    In this informational webinar, learn how today’s leading-edge CASB solution empowers security operations teams to keep up with the pace of O365 deployment, offering a single pane of glass for email and collaboration security, along with related compliance. By delivering the full breadth of O365 monitoring, data in motion and enforcement capabilities, we’ll detail how CipherCloud CASB+ addresses critical capabilities including:

    - Securing data in Teams Channels and Chats, along with O365 email
    - Utilizing integrated DLP and IRM with multi-level policy enforcement
    - Detecting anomalous user behavior and enabling response
    - Leveraging Data Discovery to ensure data privacy and compliance.
    - Expanding policies across multiple cloud apps and platforms

    Register today for this O365 secure collaboration best practices webinar.
  • Capital One Data Breach - Seven Steps to Secure Sensitive Data on AWS Recorded: Jul 16 2021 57 mins
    Mahesh Rachakonda, Vice President – Product & Solution Engineering at CipherCloud
    Regardless of where the data is stored, it is prone to zero-days, bad actors, and human errors, even though Capital One is dedicated to consumer privacy and has stringent security controls. Capital One data was stored on a cloud service provided by Amazon Web Services. Organizations adopting cloud applications are struggling to protect from such emerging threats. Additionally, they need to satisfy regulatory demands, such as PCI, GDPR, the California Consumer Privacy Act, and HIPAA.

    The breach took place in stages across March and April 2019, and data became available to the hacker in decrypted form, raising the following cloud security concerns:

    Is the encryption provided by cloud service providers robust enough to protect sensitive data?
    Is there a lack of proper monitoring and risk assessment tools with cloud security providers to prevent such breaches at the onset?
    Is the data in the cloud protected from both external and internal threats?

    As an organization are you heavily invested in cloud and does this breach concern you? Attend our webinar on 11am EDT on Wednesday August 28th, 2019 to understand critical security controls that must be in place, and how CipherCloud with its industry-leading Zero Trust cloud security, encryption, Digital Rights Management, DLP, UEBA and CSPM capabilities can prevent such data breaches.
  • 5 Steps to Improving Data Protection for Salesforce, ServiceNow and Workday Recorded: Jul 16 2021 59 mins
    Mahesh Rachakonda, VP – Product & Solution Engineering at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Enterprise SaaS apps including Salesforce, ServiceNow, and Workday, among many others, provide critical services to millions of today’s organizations, automating and streamlining workflows while enabling real-time collaboration from any location.

    At the same time, related incidents such as the much-publicized Equifax data breach, continue to create concern as practitioners seek additional security capabilities and best practices that go beyond SaaS apps’ native security controls. Organizations need reassurance that they can apply a zero trust approach to securing cloud information, services and access, invoking layered defenses to prevent against potential threats and data exposure.

    In this best practices webinar, we’ll cover many of the leading SaaS apps security challenges facing today’s organizations, along with key steps that practitioners can utilize to rapidly improve their overall security standing. We’ll specifically dive in to the advanced capabilities of Cloud Access Security Broker (CASB) technologies in addressing these requirements and highlight how the CipherCloud CASB+ platform addresses pertinent questions including:

    - How do I gain 360-degree visibility into cloud user activity, including file uploads and information sharing?
    - How do I detect suspicious user behavior and prevent data loss due to compromised accounts or insider threats?
    - How do I detect and protect sensitive information such as PII, PCI, and PHI data as it travels across cloud apps?
    - How do I differentiate managed and unmanaged devices to enable secure data access and collaboration?
    - How do I ensure compliance with the latest data protection laws such as GDPR, CCPA, and HIPPA?

    Register today to gain valuable insights and best practices for securing your company’s data in leading enterprise SaaS applications.
  • The Policy Predicament - Getting the Most out of Cloud DLP Recorded: Jul 16 2021 60 mins
    Mahesh Rachakonda, VP – Product & Solution Engineering at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Accelerated cloud adoption proved to be the biggest thing that ever happened to data loss prevention (DLP). With so much information finding its way into cloud applications, practitioners had to find a vehicle for active enforcement. In effect, strategic use of email, network, endpoint and other “on-prem” DLP finally became a reality, along with growing adoption of DLP capabilities designed specifically for the cloud.
  • The Top Seven Tips for Securing SAP SuccessFactors Recorded: Jul 16 2021 48 mins
    Madhu Dodda, Senior Manager- Product Management & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Numerous organizations are turning to the SAP SuccessFactors platform to help “manage through disruption” by adopting capabilities spanning Talent Management, HR and Payroll, and related analytics, among others. At the same time, addressing any related risk or security exposure remains a top priority.

    To that end, companies deploying SAP SuccessFactors as their strategic HR and Human Capital Management platform must also include advanced cloud and data security capabilities to protect sensitive data, prevent data exfiltration and maintain regulatory compliance. That’s why leading IT Security and HRIS practitioners have turned to CipherCloud to provide the security, data protection and governance required when embracing cloud HR and HCM.

    In this best practices webinar, join CipherCloud as we highlight the Top Seven Tips for Securing SAP SuccessFactors, spanning key requirements including:
    - Maintaining continuous visibility into applications usage
    - Controlling access from trusted locations and devices
    - Maintaining optimized protection wherever data travels
    - Enforcing policies to ensure compliance [ex. GDPR]
    - Encrypting any protected data with full key control
    - Detecting threats including malware and compromises
    - Performing context-driven forensic investigation

    Register today to learn how the CipherCloud CASB+ solution can accelerate your organization’s use of SuccessFactors HR, Recruiting, Organizational Management and Payroll capabilities.
  • Ecosystème mobile (EDR, UEM, IAM) - Analyse et mise en perspective Lookout Recorded: Jul 6 2021 28 mins
    Bastien Bobe: Security Engineer, Europe du Sud, Lookout
    Série: Comprendre le risque mobile
    Webinaire: 4 / 5

    Focus:
    Complémentarité et la nécessité d’intégrer le MTD dans la politique de sécurité globale afin d’automatiser le traitement du risque mobile dans la stratégie d’entreprise.

    Agenda:
    Rôle, Responsabilité, complémentarité du MTD versus UEM
    Etude de cas réel UEM: Lookout intégré et déployé via un environnement Workspace One UEM, Carbon Black
    Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)

    Intervenants:
    - Bastien Bobe: Security Engineer, Europe du Sud
    - Jean Christophe Prudhomme: Channel Manager, Europe du Sud
  • Les risques liés au divertissement sur mobile Recorded: Jul 6 2021 29 mins
    Bastien Bobe: Security Engineer, Europe du Sud, Lookout
    Focus:
    Les risques involontaires lorsque les mobiles professionnels deviennent aussi des outils de divertissement.

    Agenda:
    - Avec 3 exemples concrets nous verrons comment les employés ou leurs proches mettent en danger leurs données personnelles et professionnelles simplement en jouant.
    - Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)

    Intervenants:
    - Bastien Bobe: Security Engineer, Europe du Sud
    - Jean Christophe Prudhomme: Channel Manager, Europe du Sud
  • Lookout + CipherCloud: La sécurité des services cloud depuis tous vos terminaux Recorded: Jul 6 2021 36 mins
    Bastien Bobe: Sécurité Sales Engineer Europe du Sud, Lookout
    Principales fonctionnalités de la solution SASE développée par Ciphercloud dont Lookout a fait l'acquisition récemment.

    Les solutions CipherCloud couvrent plusieurs technologies SASE, dont Cloud Access Security Broker (CASB), Zero-Trust Network Access (ZTNA), Secure Web Gateway (SWG) et Data Loss Prevention (DLP). Ensemble, ces solutions offrent à la fois une visibilité complète sur la sécurité des données, une protection contre les menaces et la conformité aux réglementations pour les applications basées dans le Cloud.

    Agenda:
    Cas pratiques, comment Lookout sécurise l'utilisation des services cloud quel que soit le terminal, le contexte et le type de données manipulées.

    Intervenants:
    - Bastien Bobe: Sécurité Sales Engineer Europe du Sud
    - Jean Christophe Prudhomme: Channel Manager Europe du Sud
  • Phishing Mobile au-delà de l’email - Analyse et mise en perspective Lookout Recorded: Jul 6 2021 28 mins
    Bastien Bobe: Security Engineer Europe du Sud, Lookout
    Focus:
    Emergence des campagnes de phishing dédiées mobiles exploitant l’actualité (info covid, vaccination, arnaque au faux colis, impôts).

    Agenda:
    - 3 exemples de campagnes de Phishing sur différents médias (SMS, Facebook, Whatsapp)
    - Comment se protéger des attaques de phishing qui ciblent de plus en plus les mobiles?
    - Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)

    Intervenants:
    - Bastien Bobe: Security Engineer Europe du Sud
    - Jean Christophe Prudhomme: Channel Manager Europe du Sud
  • Episode Three: A Business Case for Mobile Security Recorded: Jul 1 2021 32 mins
    Chris Hazelton, Director, Security Solutions, Lookout
    Learn how to make the case for mobile security, and what steps you can take to measurably reduce risks for your organization. Better understand how to protect the critical enterprise productivity tools that live in our pockets.

    Speakers:

    - Chris Hazelton, Director, Security Solutions, Lookout
    - Vincent Sritapan, Cyber QSMO Section Chief, Cybersecurity and Infrastructure Security Agency
    - Naresh Balasubramanian, Director, Information Security & Infrastructure, Washington Post
  • Episode One: Prepare for the next phase of work-anywhere security Recorded: Jun 24 2021 37 mins
    Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    "Fundamentally attackers are trying to get your data, and the way attackers get your data is through your people"
    "Where your people are and how you secure access to data has changed"

    Listen to this 30-minute fireside chat for answers on:

    - How will hybrid-work change security for the long run?
    - How can a Zero Trust approach be used to solve the current security challenges?
    - How do companies adapt their security strategy?
    - Why Lookout extended its product offering to include CASB and ZTNA

    Host
    - Sr. Manager of Security Solutions & host of the Endpoint Enigma podcast

    Speakers
    - Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    - Nick Sears, Vice President of SASE, Lookout
Work anywhere with endpoint-to-cloud security
Lookout is an integrated endpoint-to-cloud security company. Our mission is to secure and empower our digital future in a privacy-focused world where mobility and cloud are essential to all we do for work and play. We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Lookout is trusted by millions of consumers, the largest enterprises and government agencies, and partners such as AT&T, Verizon, Vodafone, Microsoft, Google, and Apple. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C. To learn more, visit www.lookout.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Episode Two: From the Frontlines: Threats for Your Mobile Fleet
  • Live at: Jun 17 2021 9:00 am
  • Presented by: Aaron Cockerill, Chief Strategy Officer, Lookout
  • From:
Your email has been sent.
or close