The State of Mobile Payment Security: How to Enable and Secure Mobile Payments

Logo
Presented by

Krishna Vishnubhotla, Zimperium | Tim Hartog, Zimperium | Andrew Snyder, Zimperium

About this talk

As widespread worldwide adoption of smartphones continues, and as global consumers conduct an increasing proportion of their shopping online due to the restrictions imposed by the last two plus years of a global pandemic, mobile transactions have skyrocketed. Yet, two years ago just prior to the first outbreaks of COVID-19, the Pew Charitable Trusts published research that suggested distrust and avoidance of mobile payments was common due, primarily, to consumer security concerns: “Respondents were more likely to say mobile payments are “poorly protected” (38 percent) than prepaid (28 percent), debit (22 percent), or credit cards (9 percent).” (Source: Pew) Aside from the pandemic and its far-reaching impacts, what has changed for mobile payment security since October 2019, and how should organizations approach mobile applications and mobile devices in order to better secure modern transactions in an increasingly mobile-connected and regulated world? Join us for a discussion on “The State of Mobile Payment Security,” where we’ll discuss: -How the definition of “payments” has evolved -Various types of mobile payments/transactions and use cases for mobile payments across industries -The most commonly exploited vulnerabilities in mobile payments -Current and impending compliance considerations for securing mobile payments -Best practices for securing your organization’s mobile application

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (18)
Subscribers (2121)
As the only mobile security platform purpose-built for enterprise environments, Zimperium provides security solutions for mobile devices and applications, ensuring safe and secure access to critical data. Our patented, on-device, machine learning-based security provides visibility and protection against known threats and zero-day attacks, and our mobile application protection suite combines comprehensive in-app protection with centralized threat visibility. Here we share resources and information related to our mobile threat research, and best practices for securing mobile devices and mobile applications in the context of the modern threat landscape.