Mobile Threat Chains: Patterns of Attack Against Enterprise Devices

Presented by

Richard Melick, Director of Threat Insights and Product Strategy | Nico Chiaraviglio, VP of Security Research

About this talk

Mobile is the unsecured dream frontier for malicious actors targeting critical data and enterprise systems. According to the recently published Verizon Mobile Security Index, “53% of technology leaders surveyed reported mobile devices accessing more sensitive data than a year ago.” No matter the device OS or ownership, it is clear the mobile attack surface is increasingly under attack. From spear phishing attacks successfully targeting critical services to feature-rich mobile malware infecting mobile devices to advanced spyware, the threat vector against enterprise systems continues to get larger with each mobile endpoint connected. Zimperium zLabs research and analysis also shows that the threats to mobile are evolving in complexity and that will only continue to advance. How can your organization possibly combat the tide of mobile threats? The first important step is to know what’s out there, and what you’re even looking for. Join Zimperium for an examination of real-world threat chains and the pattern of attacks malicious actors are now employing to compromise iOS and Android mobile devices in order to infiltrate enterprise environments.

Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (28)
Subscribers (3136)
As the only mobile security platform purpose-built for enterprise environments, Zimperium provides security solutions for mobile devices and applications, ensuring safe and secure access to critical data. Our patented, on-device, machine learning-based security provides visibility and protection against known threats and zero-day attacks, and our mobile application protection suite combines comprehensive in-app protection with centralized threat visibility. Here we share resources and information related to our mobile threat research, and best practices for securing mobile devices and mobile applications in the context of the modern threat landscape.