Hi [[ session.user.profile.firstName ]]

Do You Trust Your Mobile Apps?

While users are more mobile than ever, that flexibility has also come with increased risk. As business managers push for more mobile apps, faster development, newer features and broader distribution of these apps, the businesses’ risk exposure grows exponentially. Organizations are at risk of exposing their corporate data, losing brand equity, and ultimately suffering financial loss through breaches of their mobile applications. IT must ensure these apps are secure, even if they are developed by a third party, so understanding the mobile vulnerability landscape is critical and its tough to keep this expertise in-house.

HP Security Research leveraged HP Fortify on Demand (FoD) Mobile to scan more than 2,000 mobile applications from more than 600 companies, revealing alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
Recorded Jun 17 2014 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Anumudu, Software Security Solution Architect, HP Enterprise Security
Presentation preview: Do You Trust Your Mobile Apps?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Navigating the Chasm of SIAM-Managing Infrastructure in 2018 Nov 21 2017 3:00 pm UTC 60 mins
    Jeffrey Ritter
    Governments continue to try to regulate cyberspace, often with little effective impact. Security professionals struggle to design and operate infrastructure that will comply with rules written with Semantically Intentional Ambiguous Meaning (SIAM). Learn from the classrooms of one of the world's great universities the new methods for navigating those challenges and putting in place rules that are effective for managing infrastructure.
  • The 2018 Threatscape: Cyber clairvoyance and divination Nov 14 2017 11:00 am UTC 45 mins
    Peter Wood
    What have we learned from 2017's biggest breaches and how will we deal with 2018's emerging threats? Attempting to look both backward and forward over the cyber landscape, Peter Wood will review lessons learned and apply them to the evolving threatscape.
  • Achieving Digital Trust: Turning New Threats into Customer Loyalty Oct 26 2017 2:00 pm UTC 45 mins
    Jeffrey Ritter
    Dynamic, volatile, innovative. Cloud security is all of these and more. How can cloud service vendors turn the constant parade of new threats into a continuing opportunity to increase customer loyalty? How can customers gain trust in their service vendors despite the parade? Learn how in this webcast.
  • Seeing through the Clouds: How Visibility Reduces Security Failures Oct 25 2017 3:00 pm UTC 45 mins
    Dominic Vogel, Chief Security Strategist, Cyber.SC
    As organizations continue to ramp-up their migration to cloud-based environments, they will need to account for the associated security and control risks. There are hidden dangers and blind spots that arise through the use of virtualization technology in the data center. These hidden dangers and blind spots become more prevalent as business-critical applications are increasingly deployed on the public cloud. This is a problem considering that an organization’s operations are dependent on a cloud environment that inherently has a huge visibility gap.

    Many are now making the necessary changes to keep data secure in the cloud. This talk will focus on how to pragmatically accomplish cloud security through increased emphasis on cloud network visibility and cloud access security brokers. Enterprises that can properly implement appropriate cloud network visibility and cloud access security brokers will experience a third fewer security failures. Learn about practical steps and tools that you can use for accomplishing cloud security in your organization.
  • The Future of Cloud Security: Next Generation Threat-based Testing Oct 24 2017 10:00 am UTC 45 mins
    Peter Wood
    If your processing and data is in the cloud, how can you deliver assurance, compliance and governance? How do you find the flaws and soft spots that criminals will exploit? From browser to database, through human factors and end points, this presentation will take a threat-based approach to securing the cloud.
  • Privacy Level Agreement Code of Conduct for CSPs: a compliance tool for GDPR Aug 17 2017 12:00 pm UTC 60 mins
    Paolo Balboni, Founding Partner of ICT Legal Consulting
    Paolo Balboni will discuss in a practical and business oriented way, the new provisions of the GDPR and how the PLA Code of Conduct supports compliance with the forthcoming EU Data Protection Legislation. More precisely, Balboni will highlight the true privacy compliance “game changers” introduced by the GDPR and offer the audience practical inputs on how to set up a sound and effective corporate Data Protection Compliance Programme, which will also include having a PLA in place with Cloud Service Providers.
  • BrightTALK's GDPR Benchmark Special: How Prepared are You for May 2018? Aug 17 2017 10:00 am UTC 60 mins
    Josh Downs, BrightTALK & TBC
    9 months until the GDPR deadline - are you completely up-to-speed?

    Our panel of data protection experts will be discussing the compliance considerations that you need to be assessing for May 2018 along with suggesting next steps from a cyber and general security standpoint.

    We'll also be asking YOU at what stage you're at in terms of your preparations via a series of interactive benchmarks as we go through the session to get a sense of where the security community is at in terms of preparations.

    -------------

    GDPR and its May 2018 deadline are now fully the minds of the vast majority of security professionals and with massive fines on the horizon for non-compliance, now is a better time than ever to get to grips with the legislation and ensure that your organisation is secure and compliant.

    It’s vital that your business has carried out the relevant preparations for compliance by then to make sure you don’t get whacked with a huge fine of up to £15m or 4% of your organisation’s global annual turnover.

    Not only are there potentially huge financial repercussions, but leaving your business open to attack and your customers at risk can cause serious reputational damage.
  • Using Windows Security Events to Detect Intruders in Your Network Jul 4 2017 9:00 am UTC 90 mins
    Randy Franklin Smith (Windows Security expert), Chris Martin (Security Engineer), Caitlin NoePayne (LogRhythm Sr. TPM)
    Over time, any given computer on your network will establish a pattern of systems it does and doesn’t talk to. If you can properly baseline that behaviour and detect when the computer deviates from normal activity you can produce critical early warnings of a potential incident.

    In this webcast, LogRhythm’s senior technical product manager, Caitlin NoePayne, and principal sales engineer, Chris Martin, join Randy Franklin Smith, Windows Security subject matter expert, to discuss detecting computers on your network talking for the first time using Windows Security Events. They will also demonstrate LogRhythm behavioural analytics rules and case management features that help analysts follow up on suspicious activity alerts.

    Learn how to:

    • Configure your audit policy to generate relevant security events
    • Establish baseline behaviour of the machines on your environment
    • Monitor and detect traffic patterns to detect an attacker embedded in your network using Windows Security Events
    • Speed up investigation and response with Security Automation and Orchestration

    Watch now to learn how to use Windows Security Events and LogRhythm to detect when two computers on your network talk to each other for the first time.
  • When thermostats become critical infrastructure, what will you do? Recorded: Jun 21 2017 57 mins
    Wieland Alge - GM EMEA - Barracuda Networks, Mark Harrison - Consultant - Pen Test Partners
    Would a hack on one Internet connected thermostat stop a nation? Maybe not, but imagine hundreds of connected devices being meddled with in order to cause havoc?

    Join our IOT experts to discuss the real impact of an IOT device hack. Wieland Alge, GM EMEA at Barracuda Networks and Mark Harrison, Consultant at Pen Test Partners, will look into why cyber criminals are interested in hacking IOT devices and the true impact of such an attack to organisations. Join this webinar to learn:

    • The true impact of an IOT hack
    • Methods used by hackers
    • Demos of IOT devices being hacked
    • Major challenges in protecting smart cities
    • How to mitigate these threats
  • [VIDEO] The Influence of AI & Machine Learning on the Security Industry Recorded: Jun 21 2017 13 mins
    Josh Downs, BrightTALK & Giovanni Vigna, Professor & CTO, University of Santa Barbara & Lastline
    BrightTALK caught up with Giovanni Vigna from University of Santa Barbara & Lastline for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The difference between traditional AI & Machine Learning and the tools when applied to cyber security

    - Whether the buzz surrounding the tools is legitimate

    - How the human still needs to fit into the picture when using machine learning based security techniques

    - How AI & Machine learning can be used for threat hunting purposes

    - The WannaCry virus and what it means for the ransomware landscape and how we protect ourselves from attacks

    - The value of security culture in an organisation

    - Trends in the techniques used in cyber warfare

    - The exponential growth of the IoT and what it means for securing the connected devices
  • Sharing the Data of IoT Security Incidents: 5 Keys to Improved Security Recorded: Jun 20 2017 40 mins
    Jeffrey Ritter
    Bad things happen, but the potential of IoT will be limited if those in any connected system of devices cannot share data of adverse incidents more effectively. This webcast introduces 5 keys to doing so successfully, all toward improving security across those systems.
  • Securing the Internet of Everything: The war of the coffee machines Recorded: Jun 20 2017 47 mins
    Peter Wood
    The Internet of Everything affects everyone from multi-nationals to private citizens. The universal adoption of machine to machine communications in every aspect of our lives offers criminals a hugely expanded attack surface. How do we defend ourselves without undermining the benefits of the IoE?
  • [VIDEO] Dr Jessica Barker on the Human Side of Cyber Security Recorded: Jun 20 2017 9 mins
    Josh Downs, BrightTALK & Dr Jessica Barker
    BrightTALK caught up with Dr Jessica Barker for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry ransomware, what it means for the cyber threatscape and how to protect against similar attacks in the future

    - Improving security culture in the workplace for all your staff

    - AI & Machine Learning in the cyber security realm

    - The explosion of the IoT and how to protect all the devices on the network

    - Hacking back - the ethical standpoint
  • How to Fight Massive IoT DDoS Attacks with Multi-Layered Defense Recorded: Jun 20 2017 48 mins
    Daniel Keidar, AVP of International Pre-Sales at Allot
    The rapid growth of the Internet of Things (IoT) has led to a major increase in threats to network security. The proliferation of weakly secured connected devices has enabled recent DDoS attacks to become some of the largest and most destructive on record. They have significantly compromised network services, disrupted the quality of experience for millions of users, and threatened data security.
    Existing network security solutions have not proved effective enough to mitigate such large and aggressive attacks. Operators need to fight this phenomenon with a new, comprehensive, multi-layered solution. So join us to learn:
    •The impact of massive IoT-driven attacks
    •How service providers can protect their assets and their users
    •How multi-layered solutions provide networks with the strongest defense
    •The opportunities for operators to sell security as a services to customers
  • Understanding Latest Data Breaches: Risk & Cost Analysis Recorded: Jun 20 2017 63 mins
    John Pironti, president of IP Architects, and Michael Dalgleish, director of sales engineering at LogRhythm
    The perils of security breaches are widely publicised, but do you know exactly how an attack or breach would affect your business?

    In this webinar John Pironti, president of IP Architects, and Michael Dalgleish, director of sales engineering at LogRhythm, will discuss the costs of recent data breaches and illustrate the best ways to determine your organisation’s cyber risk profile. The duo will also teach you about the security tools and processes you can implement to strengthen your security operations.

    Watch now to learn how to take your security operations to the next level.
  • [VIDEO] Ransomware Lessons and Preparing for GDPR Recorded: Jun 19 2017 4 mins
    Chris Hodson, EMEA CISO, Zscaler Inc
    BrightTALK caught up with Zscaler's Chris Hodson for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry malware and the lessons to be learned from the outbreak

    - Steps that cyber security and data protection professionals need to take to be ready for GDPR in 2018

    - The development of cyber warfare and what it means for the security industry
  • [VIDEO] WannaCry, GDPR and Protecting the Growing IoT Recorded: Jun 15 2017 10 mins
    Josh Downs, Senior Community Manager, BrightTALK & Paul Edon, International Services Director, Tripwire
    BrightTALK caught up with Tripwire's Paul Edon for an in-depth conversation on the current state of information security, today's threatscape and a discussion on the cyber industry.

    Topics up for discussion:

    - The WannaCry virus and what it means to the Ransomware landscape

    - The importance of a thorough backup

    - GDPR and the important steps that need to be taken

    - The explosive growth of the IoT and how to ensure that networks don't become vulnerable and get compromised

    - The ethical debate of hacking back
  • Panel: Real-Time Cyber Threat Remediation Using Network Analysis Recorded: Jun 14 2017 59 mins
    Josh Downs, BrightTALK [moderator]; John Smith, ExtraHop Networks & Tim Sadler, CheckRecipient
    According to the latest Verizon Data Breach Investigations Report, 93% of compromises occur within minutes. Traditional security tools do not have the "shutter speed" to detect and remediate these threats fast enough. By analyzing network behavior on the wire as it happens, correlating it with threat intelligence, and then orchestrating remediation actions, organisations gain the capabilities needed to conduct "hand-to-hand" combat against cyber adversaries.
  • [Video Panel] Fighting Ransomware: Lessons from WannaCry Recorded: Jun 8 2017 50 mins
    Josh Downs, BrightTALK, Darren Thomson, Symantec; Chris Ross, Barracuda Networks
    - BrightTALK at Infosecurity Europe 2017 -

    One month on from the WannaCry attacks, we'll be discussing their influence on the cyber security industry; whether it was a success for the cyber criminals and what organisations could've done to be better protected.

    This expert panel will cover how the ransomware spread, why there's been an explosion over the last few years, why businesses are especially vulnerable and how the malware is more and more intertwined with crypto currencies.

    Fighting Ransomware was a top priority on security professionals' minds in 2016 and that will only continue into 2017. Tune into this live panel to get insights and takeaways to protect your business from the threat of ransomware.
  • [Video Panel] Protecting the IoT: Threats, Vulnerabilities & Solutions Recorded: Jun 7 2017 48 mins
    Josh Downs, BrightTALK, Patrick Grillo, Fortinet, Danielle Cattedu, CSA & Marc Laliberte, WatchGuard
    - BrightTALK at Infosecurity Europe 2017 -

    IoT networks grow by the day - prompting sleepless nights from security professionals the world over. As more and more devices join the network, how can we ensure that they're not becoming the latest weak link in the network?

    This expert panel will look at vulnerabilities in the IoT, those that are more obvious and those that perhaps aren't. It'll also cover the latest threats targeting IoT networks; the mechanisms and techniques that are being used and how to stop them.

    The IoT will be critical to business and consumer life from hospitals to connected cars to factory floors. Security and privacy remain key concerns and this panel will break down what the explosion of IoT networks will mean for security professionals.
Your Resource for Information Security Trends & Education
With over 280,000 members, the Information Security Community is the largest community of cybersecurity professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Do You Trust Your Mobile Apps?
  • Live at: Jun 17 2014 9:00 am
  • Presented by: David Anumudu, Software Security Solution Architect, HP Enterprise Security
  • From:
Your email has been sent.
or close