Hi [[ session.user.profile.firstName ]]

Phishing Mobile au-delà de l’email - Analyse et mise en perspective Lookout

Focus:
Emergence des campagnes de phishing dédiées mobiles exploitant l’actualité (info covid, vaccination, arnaque au faux colis, impôts).

Agenda:
- 3 exemples de campagnes de Phishing sur différents médias (SMS, Facebook, Whatsapp)
- Comment se protéger des attaques de phishing qui ciblent de plus en plus les mobiles?
- Panorama des risques mobiles et comment s’en protéger (Malware, Compromission avancée, Phishing et attaques réseaux)

Intervenants:
- Bastien Bobe: Security Engineer Europe du Sud
- Jean Christophe Prudhomme: Channel Manager Europe du Sud
Recorded Jul 6 2021 28 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Bastien Bobe: Security Engineer Europe du Sud, Lookout
Presentation preview: Phishing Mobile au-delà de l’email - Analyse et mise en perspective Lookout

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Episode Four: Guilty until proven innocent - Playing by Zero Trust laws Oct 14 2021 10:00 am UTC 32 mins
    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief, Defense Intelligence Agency
    Users and endpoints are being targeted by security threats from all angles, is a Zero Trust security strategy the answer?

    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief of the Defense Intelligence Agency will join Lookout for the final episode of our Achieving Endpoint-to-Cloud Security series.

    Learn how Tyler helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats, as she answers:

    - What cyberattacks stand out and how have threats evolved?
    - Could a Zero Trust mindset have prevented previous security breaches from happening?
    - Why losing your smartphone is much riskier than losing your wallet?
    - What practices enterprises and government organizations can put in place to reduce phishing risk?
  • Episode Three: How to defeat ransomware attacks Oct 13 2021 10:00 am UTC 62 mins
    Magda Chelly Head of Cyber Consulting, Former CISO, Founder of Women on Cyber
    The third episode in the Achieving Endpoint-to-Cloud Security series welcomes Magda Chelly, Head of Cyber Consulting, Former CISO, Founder of Women on Cyber who will answer:

    - Why are ransomware attacks increasing?
    - What are the most common entry points?
    - What are attackers doing to maximize their return?
    - Can we trust attackers to give data back exactly as they found it?
  • Security from Endpoint to Cloud Oct 12 2021 9:00 am UTC 21 mins
    Aaron Cockerill, Chief Strategy Officer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. To securely tap into this productivity you need a Secure Access Service Edge (SASE), delivering data protection in the cloud like you still have a perimeter. But existing SASE technologies are invasive and clash with the users expectation of privacy when working remotely. It’s only when you integrate endpoint security with SASE that you can protect data in a manner that respects personal privacy.

    Watch this session with Aaron Cockerill, Chief Strategy Officer at Lookout to learn why you need integrated endpoint-to-cloud security to safeguard your data while complying with regulations and respecting personal privacy.
  • Episode One: Prepare for the next phase of work-anywhere security Oct 11 2021 10:00 am UTC 37 mins
    Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    "Fundamentally attackers are trying to get your data, and the way attackers get your data is through your people"
    "Where your people are and how you secure access to data has changed"

    Listen to this 30-minute fireside chat for answers on:

    - How will hybrid-work change security for the long run?
    - How can a Zero Trust approach be used to solve the current security challenges?
    - How do companies adapt their security strategy?
    - Why Lookout extended its product offering to include CASB and ZTNA

    Host
    - Sr. Manager of Security Solutions & host of the Endpoint Enigma podcast

    Speakers
    - Tom Davison, Senior Director, EMEA Security Engineering, Lookout
    - Nick Sears, Vice President of SASE, Lookout
  • Security from Endpoint to Cloud Oct 7 2021 5:00 pm UTC 21 mins
    Aaron Cockerill, Chief Strategy Officer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. To securely tap into this productivity you need a Secure Access Service Edge (SASE), delivering data protection in the cloud like you still have a perimeter. But existing SASE technologies are invasive and clash with the users expectation of privacy when working remotely. It’s only when you integrate endpoint security with SASE that you can protect data in a manner that respects personal privacy.

    Watch this session with Aaron Cockerill, Chief Strategy Officer at Lookout to learn why you need integrated endpoint-to-cloud security to safeguard your data while complying with regulations and respecting personal privacy.
  • Achieve Enhanced Cloud Security with Data Loss Prevention Oct 7 2021 9:00 am UTC 52 mins
    Sascha Spangenberg, Consulting Sales Engineer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. Cloud apps such as SAP, Workday and Salesforce have increased productivity, but so has the risk your data is exposed to. To tap into this boosted productivity without risking your data, you need to stay in full control. In this session you will learn:

    - What is SASE and how to easily deploy it to protect your cloud apps
    - How Data Loss Prevention (DLP) enables you to stay in control of your data with advanced data protection capabilities
    - How to track and gain visibility in shadow clouds
    - How to achieve mobile security with conditional access
  • Achieve Enhanced Cloud Security with Data Loss Prevention Oct 6 2021 11:00 pm UTC 52 mins
    Sascha Spangenberg, Consulting Sales Engineer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. Cloud apps such as SAP, Workday and Salesforce have increased productivity, but so has the risk your data is exposed to. To tap into this boosted productivity without risking your data, you need to stay in full control. In this session you will learn:

    - What is SASE and how to easily deploy it to protect your cloud apps
    - How Data Loss Prevention (DLP) enables you to stay in control of your data with advanced data protection capabilities
    - How to track and gain visibility in shadow clouds
    - How to achieve mobile security with conditional access
  • Security from Endpoint to Cloud Oct 6 2021 11:00 pm UTC 21 mins
    Aaron Cockerill, Chief Strategy Officer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. To securely tap into this productivity you need a Secure Access Service Edge (SASE), delivering data protection in the cloud like you still have a perimeter. But existing SASE technologies are invasive and clash with the users expectation of privacy when working remotely. It’s only when you integrate endpoint security with SASE that you can protect data in a manner that respects personal privacy.

    Watch this session with Aaron Cockerill, Chief Strategy Officer at Lookout to learn why you need integrated endpoint-to-cloud security to safeguard your data while complying with regulations and respecting personal privacy.
  • Cloud applications: A Zero Trust approach to security in Healthcare Oct 4 2021 9:00 am UTC 57 mins
    Nick Sears, Vice President of SASE, Lookout
    Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable both employees and patients to access data from anywhere. Compound this use of managed and unmanaged mobile devices in a world where the network perimeter is being eroded and you have a real challenge at hand.

    Join ISMG and Lookout to find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – regardless of SaaS, IaaS or on-premises application.

    AGENDA:

    Zero Trust - How to apply a dynamic and contextual approach to applications and data access in the cloud.
    Data Protection and DLP for preventing data loss - Using advanced DLP to ensure data is protected against inappropriate upload, download and sharing.
    Threat Prevention and Anomaly Detection - Gain deep visibility into user activity across all cloud applications and prevent malware and associated risks.
    Audit and Compliance - How to administer a common security policy and investigate for real-time compliance across SaaS apps and platforms.
    Lookout CASB+ and ZTNA platform - Interactive demo.
  • The Top Seven Tips for Securing SAP SuccessFactors Recorded: Sep 21 2021 48 mins
    Madhu Dodda, Senior Manager- Product Management & Solution Engg at CipherCloud and Matt Hines, VP of Marketing at CipherCloud
    Organizations are turning to the SAP SuccessFactors platform to help “manage through disruption” by adopting capabilities spanning Talent Management, HR and Payroll, and related analytics, among others. At the same time, addressing any related risk or security exposure remains a top priority.

    To that end, companies deploying SAP SuccessFactors as their strategic HR and Human Capital Management platform must also include advanced cloud and data security capabilities to protect sensitive data, prevent data exfiltration and maintain regulatory compliance. That’s why leading IT Security and HRIS practitioners have turned to CipherCloud to provide the security, data protection and governance required when embracing cloud HR and HCM.

    In this best practices webinar, join CipherCloud as we highlight the Top Seven Tips for Securing SAP SuccessFactors, spanning key requirements including:
    - Maintaining continuous visibility into applications usage
    - Controlling access from trusted locations and devices
    - Maintaining optimized protection wherever data travels
    - Enforcing policies to ensure compliance [ex. GDPR]
    - Encrypting any protected data with full key control
    - Detecting threats including malware and compromises
    - Performing context-driven forensic investigation

    Register today to learn how the CipherCloud CASB+ solution can accelerate your organization’s use of SuccessFactors HR, Recruiting, Organizational Management and Payroll capabilities.
  • Achieve Enhanced Cloud Security with Data Loss Prevention Recorded: Sep 13 2021 52 mins
    Sascha Spangenberg, Consulting Sales Engineer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. Cloud apps such as SAP, Workday and Salesforce have increased productivity, but so has the risk your data is exposed to. To tap into this boosted productivity without risking your data, you need to stay in full control. In this session you will learn:

    - What is SASE and how to easily deploy it to protect your cloud apps
    - How Data Loss Prevention (DLP) enables you to stay in control of your data with advanced data protection capabilities
    - How to track and gain visibility in shadow clouds
    - How to achieve mobile security with conditional access
  • Cloud applications: A Zero Trust approach to security in Healthcare Recorded: Sep 3 2021 57 mins
    Nick Sears, Vice President of SASE, Lookout
    Accelerated adoption of the cloud has driven healthcare organizations to rely more heavily on cloud-based productivity suites and apps that enable both employees and patients to access data from anywhere. Compound this use of managed and unmanaged mobile devices in a world where the network perimeter is being eroded and you have a real challenge at hand.

    Join the Lookout team today to find out how organizations are adopting a multi-cloud security approach to protect their cloud environment and data from endpoint-to-cloud – regardless of SaaS, IaaS or on-premises application.

    AGENDA:

    Zero Trust - How to apply a dynamic and contextual approach to applications and data access in the cloud.
    Data Protection and DLP for preventing data loss - Using advanced DLP to ensure data is protected against inappropriate upload, download and sharing.
    Threat Prevention and Anomaly Detection - Gain deep visibility into user activity across all cloud applications and prevent malware and associated risks.
    Audit and Compliance - How to administer a common security policy and investigate for real-time compliance across SaaS apps and platforms.
    Lookout CASB+ and ZTNA platform - Interactive demo.
  • Schneider Electric Secures 50,000 Devices with Lookout Recorded: Sep 2 2021 7 mins
    Simon Hardy-Bistagne, Director - Digital Workplace Architecture & Innovation at Schneider Electric
    Simon Hardy-Bistagne, Director - Digital Workplace Architecture & Innovation at Schneider Electric joins Aaron Cockerill, Chief Strategy Officer at Lookout on stage at the Gartner Symposium/ITxpo to discuss how Schneider Electric secures mobile users and devices accessing corporate data.
  • Episode Four: Guilty until proven innocent - Playing by Zero Trust laws Recorded: Sep 2 2021 32 mins
    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief, Defense Intelligence Agency
    Users and endpoints are being targeted by security threats from all angles, is a Zero Trust security strategy the answer?

    Tyler Cohen Wood, Former Senior Intelligence Officer and Deputy Cyber Chief of the Defense Intelligence Agency will join Lookout for the final episode of our Achieving Endpoint-to-Cloud Security series.

    Learn how Tyler helped the White House, DoD, federal law enforcement and the intel community thwart many cyber threats, as she answers:

    - What cyberattacks stand out and how have threats evolved?
    - Could a Zero Trust mindset have prevented previous security breaches from happening?
    - Why losing your smartphone is much riskier than losing your wallet?
    - What practices enterprises and government organizations can put in place to reduce phishing risk?
  • Episode Two: Prevent data leakage from productivity tools Recorded: Sep 1 2021 29 mins
    Sundaram Lakshmanan, CTO, SASE Products at Lookout
    Lookout's CTO of SASE Products, Sundaram Lakshmanan invites you and your colleagues to join him to discuss how to evolve your security strategy to prevent data loss.

    Whether an employee downloads a sensitive file or accidentally shares it with unapproved users, preventing leakage of confidential data through productivity tools is a necessity for the modern, connected enterprise.

    Watch this webinar to learn:

    - How Data Loss Prevention (DLP) technology has grown from what we've always known into what it is today.
    - How the application of DLP has changed in reaction to continuously evolving infrastructure.
    - How you can remediate DLP issues and challenges your organization is facing.
  • Security from Endpoint to Cloud Recorded: Aug 27 2021 21 mins
    Aaron Cockerill, Chief Strategy Officer at Lookout
    With digital collaboration skyrocketing, data now goes wherever it’s needed. To securely tap into this productivity you need a Secure Access Service Edge (SASE), delivering data protection in the cloud like you still have a perimeter. But existing SASE technologies are invasive and clash with the users expectation of privacy when working remotely. It’s only when you integrate endpoint security with SASE that you can protect data in a manner that respects personal privacy.

    Watch this session with Aaron Cockerill, Chief Strategy Officer at Lookout to learn why you need integrated endpoint-to-cloud security to safeguard your data while complying with regulations and respecting personal privacy.
  • What are the risks series 3/4:Australia's Game & Entertainment on Mobile Devices Recorded: Aug 17 2021 49 mins
    Zoran Pupovac
    In this 3rd edition of our 4-part webinar series we highlight the unintentional risk-taking of our employees (or their children) when business mobiles also become entertainment tools.
    Content
    - With 3 concrete examples we will see how employees or their family members put their personal and professional data at risk simply by playing.
    - Overview of mobile risks and how to protect against them (Malware, advanced compromise, phishing and network attacks)
  • What are the risks series 2/4: Australia's Mobile Phishing Beyond Email Recorded: Aug 17 2021 45 mins
    Zoran Pupovac
    During this 2nd edition of our 4 webinar series, we highlight the emergence of dedicated mobile phishing campaigns exploiting current events (covid info, vaccination, fake package scam, taxes).
    Content:
    - Three examples of Phishing campaigns on different media (SMS, Facebook, Whatsapp)
    - How to protect yourself from phishing attacks that are increasingly targeting mobiles?
    - Overview of mobile risks and how to protect against them (Malware, advanced compromise, phishing and network attacks)
  • What are the risks series 1/4: Australia's most downloaded applications Recorded: Jul 21 2021 41 mins
    Zoran Pupovac
    Report based on the most common downloaded mobile applications used in Australia.
    We will analyse the most common downloaded mobile applications used every day in Australia, in order to highlight the compliance and security challenges.
    Agenda:
    1) Overview and ranking of the most used applications by Australians in 2020
    2) Analysis and summary of the risks associated with these applications
    3) Overview of mobile risks and how to protect against them (Malware, advanced compromise, phishing and network attacks)
  • Identify and remediate misconfigurations in Salesforce and Office 365 Recorded: Jul 16 2021 35 mins
    Mahesh Rachakonda, Vice President – Product & Solution Engineering at CipherCloud
    Cloud adoption is on the rise. Organizations are tapping to the unlimited supply of on-demand servers and services for business transformation and remote collaboration at reduced operational expenditure.

    But the skillset of IT teams is unable to match an organization's growing cloud portfolio. Difficulty in maintaining simultaneous visibility across all cloud apps creates a huge security gap, leaving the clouds susceptible to threats and breaches due to security and access misconfigurations.

    Join us for a webinar session on July 9, 2020, at 9 AM PDT to understand how CipherCloud’s Cloud Security Posture Management (CSPM) and SaaS Security Posture Management (SSPM) perform an automated assessment of your IaaS and SaaS landscape against well-defined security guidelines, reducing the operational complexity in managing multiple apps, preventing data loss from misconfigurations and ensuring compliance in a multi-cloud environment.
Work anywhere with endpoint-to-cloud security
Lookout is an integrated endpoint-to-cloud security company. Our mission is to secure and empower our digital future in a privacy-focused world where mobility and cloud are essential to all we do for work and play. We enable consumers and employees to protect their data, and to securely stay connected without violating their privacy and trust. Lookout is trusted by millions of consumers, the largest enterprises and government agencies, and partners such as AT&T, Verizon, Vodafone, Microsoft, Google, and Apple. Headquartered in San Francisco, Lookout has offices in Amsterdam, Boston, London, Sydney, Tokyo, Toronto and Washington, D.C. To learn more, visit www.lookout.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Phishing Mobile au-delà de l’email - Analyse et mise en perspective Lookout
  • Live at: Jul 6 2021 8:28 am
  • Presented by: Bastien Bobe: Security Engineer Europe du Sud, Lookout
  • From:
Your email has been sent.
or close