Rogue Mobile Apps: Trends, Threat Review and Remedies for BYOD Challenges

Manage webcast
Gerry D'Agostino, VP, RiskIQ
Looking at real use cases this presentation to uncover best practices for minimizing the risk of BYOD.

Gerry D'Agostino of RiskIQ will be looking at the history, current environment and new exploits impacts of Rogue Mobile Applications. By reviewing real use cases with specific incident data, we will be able to look at industry responses, organizational policies, and protective measures that enterprises can implement to minimize the Risks of BYOD. We will review trends and look at the potential near term effects on security, risk and compliance groups.
Jul 12 2012
36 mins
Rogue Mobile Apps: Trends, Threat Review and Remedies for BYOD Challenges
Join us for this summit:
More from this community:

IT Security

  • Live and recorded (5867)
  • Upcoming (127)
  • Date
  • Rating
  • Views
  • Channel
  • Channel profile
  • Creating a Culture of Continuity: Business Continuity Planning & Risk Management Jul 22 2015 2:00 pm UTC 45 mins
    Eric Kretz, Director, Continuity of Operations (COOP) Division, National Continuity Programs (NCP)
    Continuity planning is simply the good business practice of ensuring the execution of essential functions through all circumstances, and it is a fundamental responsibility of public institutions and private entities responsible to their stakeholders. Continuity planning should not be a separate and compartmentalized function performed by independent cells of a few planners in each organization. Organizations must fully integrate continuity into all aspects of an organization’s daily operations, thus creating a “culture of continuity.”

    The COOP presentation will:

    1. Provide an understanding of Continuity Planning and Risk Management,
    2. Explain the importance of a viable Continuity capability,
    3. Emphasize the need for a viable Continuity capability in all organizations that enable organizations to continue their essential functions across a broad spectrum of emergencies.

    In addition to providing an overview of Continuity of Operations, the COOP presentation will also:

     Educate Federal, State, territorial, tribal, local government jurisdictions, private sector organizations, and emergency management practitioners on the importance of integrating Continuity into daily operations, functions, plans, and mission areas.
     Emphasize the Federal Government’s Policy requiring Federal agencies to be prepared for unpredictable threats such as earthquakes, accidents, sabotage, and terrorism. 
     Discuss the importance for State, territorial, tribal, local government jurisdictions, private sector organizations to be prepared for unpredictable disruption of business operations. 
     Provide States, territories, tribes, local government jurisdictions, private sector organizations, and businesses with assistance, guidance, knowledge, networking, resources, and tools needed to succeed.
  • Disclosing a cyber crime to authorities: Should you do it? What are the risks? Jul 22 2015 1:00 pm UTC 45 mins
    David Clarke, NFIB Founder, Trustee of the UK Fraud Advisory Panel and Former Head of the UK Government's Fraud Squad
    Join David Clarke, Cyber Security Evangelist, as he explores the dilemma of making a disclosure of cyber crime/incident to the authorities.
  • How the United States Postal Service secured their email channel against fraud Jul 21 2015 6:00 pm UTC 60 mins
    Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service
    Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.
  • Defining The Role of Cloud in Your Data Protection Business Continuity Plan Jul 21 2015 5:00 pm UTC 60 mins
    Jon Toigo
    Join us and business continuity expert, Jon Toigo for a practical discussion on effectively leveraging cloud services for your data protection and backup strategies. Toigo, the prolific author of thousands of articles and 17 tech-related books, emphasizes local storage of critical data combined with a low cost, off-site storage option that includes cloud storage.

    You’ll also see ways to easily connect your data protection efforts to leading cloud services, such as Amazon Web Services’ Storage Gateway and low-cost S3 services.
  • Zero Knowledge Application Development Jul 21 2015 4:00 pm UTC 45 mins
    David Dahl, Director, Crypton Project, SpiderOak, Inc.
    Today's headlines are full of hacked networks, pilfered email databases causing major embarrassment and liability. What if new applications built by startups and enterprises did not actually store any exploitable data on the server? With a 'Zero Knowledge' approach to company communications and workflow, the damage from a network or server breach can be minimized. In this talk, David will guide you through some of the techniques and tools to build Zero Knowledge communications applications that minimize liability while still providing an engaging user experience. The 'Zero Knowledge' trend is clear: if there is no plain text data stored on the server, the attacker's cost increases dramatically, making intrusions less economically feasible.
  • Why Application Whitelisting is Essential for Advanced Threat Defense Jul 21 2015 3:00 pm UTC 45 mins
    Guest Speaker: Chris Sherman, Analyst, Forrester Research
    According to Forrester, with the right approach and the right technology, application whitelisting can be an essential component for defending against evolving threats, particularly zero-day attacks that endpoint anti-malware products frequently fail to detect.

    In this webinar Chris Sherman, analyst at Forrester Research will examine:
    - The threat landscape and technology adoption trends
    - The benefits of whitelisting and how the technology has evolved
    - The challenges of application whitelisting and how to overcome them
    - The advantages of using application whitelisting in fixed function environments such as retail POS or Industrial Controls Systems
    - How to integrate application whitelisting into your overall endpoint security strategyWh

    John Fox, Director of Engineering at Digital Guardian will briefly explain:
    - How Digital Guardian application whitelisting is designed to address the key problems traditionally associated with application whitelisting
  • Security Operations Profile: Where does your organization stand? Jul 21 2015 3:00 pm UTC 45 mins
    Arabella Hallawell, VP of Corporate Strategy, Arbor Networks
    No two security teams are alike. Security organizations differ widely in how tight their budgets are, the number of dedicated staff and how their business views risk.

    Arbor Networks has sponsored a set of in depth-interviews and created a new tool to help security teams assess their current incident response profile and capabilities versus their peers and state of the art practices. The assessment provides actionable insights to prompt companies to evolve beyond existing detect and respond models that are becoming increasingly ineffective in the current threat environment

    Join this session to hear:
    • What metrics are defining the four profiles and how your organization measures up
    • Lessons learned from three case studies of teams that evolved to hunting and the benefits they achieved
    • Best practices for setting budgets, tools and strategy for a holistic data protection plan

    Take the profile assessment [], and join us for the conversation! We look forward to your participation.
  • Investigate Attacks Like Never Before: Pivoting through Attackers Infrastructure Jul 16 2015 5:00 pm UTC 45 mins
    Jeremy Lindon, Sr Product Manager and Meg Diaz, Sr Product Marketing Manger, OpenDNS
    Attackers break in and pivot through your infrastructure—making their way through critical systems, learning corporate secrets, and ultimately stealing your data. What if you could turn the tables and pivot through their infrastructure?

    Imagine finding one malicious domain or IP and using it to map out the attacker’s infrastructure in minutes. With OpenDNS Investigate, you get visibility into the related domains, IPs, and autonomous systems that may be leveraged for attacks now and in the future.

    Using examples of attacks, we will show how you can pivot through attackers’ infrastructures and stay ahead of attacks. Join this webcast to find out how you can use OpenDNS Investigate to:
    - Investigate attacks like never before
    - Gain global context to better prioritize incident response
    - Predict where future attacks are staged
  • Close Operational Gaps for Better Cybersecurity Jul 16 2015 4:00 pm UTC 60 mins
    Joerg Sieber, Senior Product Marketing Manager, Palo Alto Networks
    As security solutions become more sophisticated, the challenge is not a lack of data, but how to cut through the noise quickly to understand what is actionable and where to allocate resources.

    In this webinar, we discuss strategies that provide your organization the best protection against cyberthreats:

    •Reduce response times with visual actionable data
    •Discover the unknown with automated threat correlation
    •Streamline management with operational and policy control
  • For Security Sake: Consolidate Your Secure Remote Access Infrastructure Jul 14 2015 5:00 pm UTC 60 mins
    Prakash Mana, Director of Product Management, Citrix; Akhilesh Dhawan, Principal Product Marketing Manager, Citrix
    Securely managing a cohesive network infrastructure of essential enterprise apps and data has never been more challenging. In this webinar, we will cover day-in-the-life scenarios, highlighting challenges faced by IT teams in providing secure remote access to support mobility and security via centrally hosted applications, data and systems. We will then discuss how consolidating multiple access gateways, including mobile-specific gateways and classic SSL VPNs, with Citrix NetScaler with Unified Gateway helps provide One URL for secure remote access while reducing TCO, simplifying IT, strengthening security and ensuring a high-definition experience for both mobile and traditional application users.
  • Why Your Firewall Strategy Isn’t Working: All About Internal Network Firewalls Jul 9 2015 6:00 pm UTC 45 mins
    John Maddison, VP of Marketing, Fortinet
    No one is trying to reinvent the wheel here, but lets call a spade a spade. The level of threats are increasing, they are advanced, they are persistent and they are costly, so its no surprise traditional firewalls that focus on borders are just not working like they used to. The truth is the internal network is no longer a “trusted” environment, whether a malicious outsider, evil insider or unknowing participant, once inside, threats can spread and do maximum damage. Internal firewalls, while not a new concept, are finally taking hold and the results are a game changer for network protection.

    Fortinet is proud to present, Why Your Firewall Strategy Isn’t Working, Let’s Talk About Internal Network Firewalls, a deep dive into why INFW is the new “must have” in the ever shifting threat landscape.

    - Discover how multiple layers of defense are the new standard for highly-sophisticated attacks that are getting past border defenses.
    - Learn how INFW is different as a compliment to existing Firewalls and various deployment scenarios
    - Understand how a single device can work efficiently in multiple segments

    Don’t Miss, Why Your Firewall Strategy Isn’t Working, Let’s Talk About Internal Network Firewalls, and learn how an Internal Network Firewall can provide the necessary inside-out network protection you need to protect your critical data against advanced threats.
  • Mac Security for Business Jul 8 2015 5:00 pm UTC 60 mins
    Dave Howard, Instructional Designer and Don Lewis, Solutions Marketing Manager
    Learn how to protect the Mac platform in your business.
  • Hackers, Attackers, and Criminals -The never ending, dynamic and evolving threat Jul 8 2015 3:00 pm UTC 45 mins
    Carlos A. Fernandes, CISSP, CEO, Agile Cybersecurity Solutions
    Cybercrime continues to increase, with nearly 100% of Forbes Global 2000 companies reporting data breaches within the last 12 months.
    It is estimated that over 200 nations have Intelligence capabilities and their #1 target is the United States. Cyber tools, used for exploitation, can also be used for cyber attacks. These capabilities are being built by the 1,000s. The result is that most US corporations have been penetrated. Furthermore, most network security appliances may stop a novice attack but they are no match for a sophisticated threat actor. The presentation will explore the evolving threat, why we should care, and what we can and cannot do to counter this never ending, dynamic and evolving threat.
  • Data Immunization: A New Approach to Protect Against the Insider Threat Jul 8 2015 3:00 pm UTC 45 mins
    Eyal Manor, VP Product Management, Secure Islands
    Organizations spend millions to protect data from outside threats, but are investing far less to protect themselves against attacked from inside. Security experts agree that there is currently no way of completely block hacks or prevent insiders from leaking information. But is the situation completely hopeless?

    This session will present a new paradigm for keeping sensitive data safe by classifying and protecting it at the source. How to enhance the performance of DLP? How to enable collaboration and BYOD in a secure manner? How can you track all organizational data and pinpoint risk? How can you make the threat of data theft and loss irrelevant?

    Join our session to learn the answer.
  • Cloud Attack: Unsharing Your Business in The Cloud Jul 8 2015 3:00 pm UTC 45 mins
    Jason Hart, VP Cloud Solutions - Gemalto
    In this presentation we will examine real cases that show how vulnerable cloud and virtual environments can be without the correct controls. You will see how easily controls can be bypassed and compromised, why software keys are simply not good enough, and how your personal life threatens your business and work life. Join us on July 8th to learn what we call, unsharing your data.
  • Myth or Reality: Insider Threat Victims DON'T Have Their Heads in the Cloud Jul 8 2015 2:00 pm UTC 45 mins
    Evelyn de Souza, Data Governance Workgroup Chair, Cloud Security Alliance & Data Privacy and Compliance Leader, Cisco Systems
    We can safely predict that an insider threat targeting cloud will be the cause of a major data breach over the next 12 months. While cloud insider threats consistently rank as a top concern, they have not been decomposed and mitigated like enterprise exploits. We will uncover threat vectors and behavioural traits and present new techniques for discovering and mitigating cloud insider threats. This webcast will also include a breakdown and comparison of different cloud models.

    Attendees will also learn:

    • Techniques for reconstructing audit trails to help with the deconstructing of an insider threat

    • Ways to quickly recover from the effects of an insider threat to minimize business disruption and impact
  • Complex Incident Response Investigations: How to Minimise Breach Impact Jul 8 2015 1:00 pm UTC 60 mins
    Rafe Pilling, Senior Security Researcher, Dell SecureWorks
    How prepared are you for a data breach?

    With the threat environment growing more complex, and the rise in advanced and targeted attacks, how does your response plan hold up? Threat actors have changed their tactics; so must you.

    During this webcast, Rafe Pilling, Senior Security Researcher for Dell SecureWorrks Counter Threat Unit (CTU), will share advice based on real-world examples to help ensure your organisation is infinitely better prepared to respond to a security breach.

    Key topics covered include:

    · A view of the evolving threat landscape and how this could impact you

    · Examples of critical mistakes Dell SecureWorks has viewed in real-world cases

    · Developing a robust incident response plan

    · Maximising the value of current controls and improving your overall security posture
  • Detecting Malicious Insiders Through Behavioural and Operational Analytics Jul 8 2015 12:00 pm UTC 45 mins
    Vinoth Sivasubramanian, CISO, Alaacart
    Combating insider threats is an extremely daunting task. Even more challenging is to unearth and defend crimes that could be committed by potential malicious insiders who are organized and enjoy a high degree of trust. This presentation shall discuss the current state of insider threats, the detection mechanisms available, why they are not enough and also suggest practical methods that can help detect and prevent potential frauds. Elucidated through a case study, this presentation shall walk you through on how we developed and implemented a framework using BIG DATA technology, user attributes and proven methods of behavioral science to unearth potential malicious insiders. With a detection rate of 90 percent, this is a highly adaptable model and gets easily integrated within your SIEM/Incident management and delivers great Return on Investment.
  • Insider Threats – Real Problems and Real Solutions Jul 8 2015 10:00 am UTC 45 mins
    Peter Wood, CEO, First Base Technologies
    Malicious attacks and accidental breaches by insiders present a real threat to organisations of all types. Insiders are uniquely positioned with legitimate access to data, networks and premises, allowing them to effectively bypass firewalls and intrusion detection systems. Pete and his team have conducted hundreds of simulated insider attacks and have found common themes emerge, regardless of business sector or size of business. In this presentation, discover the critical weaknesses that insiders exploit and the key, practical steps to defending against the insider threat.
  • Data-centric Security & Encryption: Keeping Your Critical Data Safe Recorded: Jul 7 2015 47 mins
    Albert Biketi, VP & GM, HP Security, Atalla
    Data’s coming at us at a pace never before imagined. Without data-centric protection that secures your sensitive information throughout its entire lifecycle, you’re at risk. The use of data-centric security and encryption solution from HP Atalla and HP Security Voltage can help you rest assured that your data remains inaccessible, even if captured, lost, or stolen. Data breaches are inevitable – get prepared. Join this webinar to learn how to best protect your structured and unstructured data at rest, in motion, and in the cloud. Data-centric security will help you neutralize the potential damage from security breaches.
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Rogue Mobile Apps: Trends, Threat Review and Remedies for BYOD Challenges
  • Live at: Jul 12 2012 6:00 pm
  • Presented by: Gerry D'Agostino, VP, RiskIQ
  • From:
Your email has been sent.
or close
You must be logged in to email this