Hi [[ session.user.profile.firstName ]]

Mobile Security: From a Management Perspective

Welcome to a growing market! By 2013 there will be a penetration grade of mobile devices of 112,46%, this means that every person will have 1.13 mobile devices. This indicates that there is a bigger and faster growing market ahead of us than the Internet (e-business, e-banking, e-payments, etc). Mobile penetration will be higher than desktop penetration by 2013. Mobile business is getting more and more important by the day.
Today mobile suppliers, developers and implementers are mainly looking at functionality and features. Their mobile challenges are: network connectivity, battery life, bring your own device (byod), commingling personal and business data, ownership & revocation and costs. But where is the security challenge? Everything has to go fast, anywhere, anytime and anyhow, but are we still aware of the insecurities, risks and threats?


Steven Ackx is a director of PwC Technology with extensive experience in Operational Risk Management, IT Security, Information Security and Mobile/Payments. He has been involved in projects on a strategic, tactical and operational level.
Today he is leading the PwC Technology offering on Mobile Security and is involved in Mobile Business/Payments.
He started his career in the Media/Movie-theatre sector, where he worked on the introduction of new technologies, like e-payments, e-ticketing and e-business. After this he joined Ubizen where he continued his career starting as a security pre-sales consultant/engineer. Two years later he was promoted to technical product manager of two high-volume security products, which were developed in-house by Ubizen, the EasyPayment and MultiSecure products (DMZShield and TrustedChannel). After being a technical product manager at Ubizen for more than two years, he worked for Ascure as an Information Security Consultant, Operations Director and Director Ascure Academy.
Recorded Jul 11 2012 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Steven Ackx, Director, Ascure (a subsidiary of PwC Advisory Services)
Presentation preview: Mobile Security: From a Management Perspective

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The 2017 Threatscape Dec 6 2016 2:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF Ltd
    more info coming soon
  • Privacy vs. Security Oct 11 2016 1:00 pm UTC 45 mins
    Steve Durbin, Managing Director, ISF Ltd
    more info coming soon
  • Simplify Your Google Apps Collaboration and Management with IDaaS Aug 18 2016 4:00 pm UTC 60 mins
    Nathan Chan, Solutions Architect at OneLogin
    Google Apps for Work is a preferred solution for productivity and collaboration in the modern enterprise. But with a large suite of tools, proper provisioning and maintenance is anything but easy. Attempting to roll out Google Apps to the right users with the right access often results in over-extended IT resources, delayed employee on- and off-boarding, and misallocated access to key documents and data.

    It doesn’t have to be this way. Hundreds of organizations are using OneLogin’s best-in-class directory integrations to achieve faster Google Apps time-to-value and on-going application security and automation.

    Join OneLogin for an informative webinar designed to get you through the most complex of Google Apps deployments.
  • The Security Risks of Orphaned Network Traffic Aug 10 2016 3:00 pm UTC 45 mins
    AnubisNetworks Labs
    As part of our research work focused on identifying automated network traffic that we can relate with malicious behavior and botnet communications, we often come across with traffic not necessarily related to malicious intent, but that represents a high risk for the companies allowing it to occur on their networks.

    Often associated with abandoned ware, policy control failures, or miss configurations, these traffic patterns end up exposing company information and assets to multiple risk levels.

    On this webinar, we are going to explore this byproduct of our botnet research, how widespread this problem is, how we can use this to relay risk information to companies, and the several degrees of exposure and impact that this type of traffic can represent.
  • Intel & Threat Analysis – The Defensive Duo Aug 10 2016 1:00 pm UTC 45 mins
    Jens Monrad, Global Threat Intelligence Liaison, FireEye
    The ongoing battle with cybercrime is asymmetric. You’ve invested millions in protection technology but unknown attackers still find a way in. So how do you stay ahead of the curve?

    "The core problem is that most cyber security tools do not make a distinction between everyday malware and advanced targeted attacks. If security tools cannot tell the difference, security teams have no way of prioritizing the alerts that matter the most."

    Join Jens Monrad, Global Threat Intelligence Liaison from FireEye in this webinar that will discuss:

    •How to ensure you are responding to the alert that matters

    •Benefits of Alerts with threat Intelligence

    •Using threat intelligence to think like your attacker

    •How to apply threat intelligence, expert rules and advanced security data analytics in order to shut down threats before they cause damage

    •How security teams can prioritize and optimize their response efforts.
  • Fast Track Your Office 365 Deployment and Beyond Aug 9 2016 5:00 pm UTC 60 mins
    OneLogin Solutions Engineer Nathan and Chan Mustafa Ebadi, VP of IT & Services at SOTI
    Whether you’ve just purchased Office 365 or have been using it for a while, deploying and managing safe access to Office 365 is not simple, fast, or pleasant. It’s your job to get the most value from your application investments, and while Microsoft has tools to assist like ADFS and DirSync, they are not only cumbersome and costly to maintain, but do not meet industry standards that can be scaled across your organization. And let’s face it, you’re not just implementing Microsoft products. Can you extend ADFS beyond Office 365 in a timely matter?

    Join OneLogin and customer SOTI, a proven product innovator and EMM Industry leader in mobile consulting, for an informative webinar about deployment best practices for Office 365 integrated with Active Directory.
  • The Next Generation of Cyber Crime is here Aug 9 2016 1:00 pm UTC 45 mins
    Rob Coderre
    Evolving tactics, techniques and procedures (TTPs) of online criminal actors have left a number of notable victim organizations in their wake and raised the bar for the security teams and law enforcement agencies that have sworn to protect them. From the migration of online criminal markets to an even deeper underground, to online extortion making a big comeback in novel ways, to increasingly effective malware crafted to steal more money and private information, if you are a potential target for online criminals, you are up against a greater cyber criminal threat than in years past.
  • Smartphone Security Analysis and Security Flaws Aug 9 2016 11:00 am UTC 45 mins
    Ayaz Hussain Abro, Information Security & GRC Consultant
    The main areas covered in this webinar will be the latest smartphone threats and malicious back doors. How Hackers are gaining access into user's mobile phone and reach into financial information just by deceiving user just with one application.

    We all make transactions through smartphone apps, and these need to be safe and alert. The audience will learn about how to defeat hackers by using smartphone smartly.
  • IDaaS: Modernize Your IAM in the Cloud Aug 2 2016 5:00 pm UTC 60 mins
    Nathan Chan, Solutions Architect at OneLogin and Al Sargent, Senior Director of Product Marketing at OneLogin
    IT, Security, and IT infrastructure teams are faced with a complex set of challenges, and identity and access management (IAM) done the old way tends to compound things. Companies who haven’t modernized their IAM infrastructure can spend months dedicated to setting up each new business application, both on premises and in the cloud, and another several months launching it to their users. It doesn’t have to be this way, with cloud-based solutions such as OneLogin reducing the time, effort, and risk of IAM modernization.

    Join us for an informative webinar with OneLogin presenters Nathan Chan, Solutions Architect, and Al Sargent, Sr. Director of Product Marketing.
  • Five Steps to Protect Your Data Center Against Cyber Threats Jul 28 2016 3:00 pm UTC 60 mins
    Christina Hausman (Product Manager, Cisco Data Center Security)
    Data centers are under unprecedented threat from hackers, malware, and insider threats. Yet modern data centers require security that doesn't compromise speed, performance or functionality.

    Join the data center security webinar "Five Steps to Protect Your Data Center Against Cyber Threats" and learn how to secure your data center and achieve consistent security across physical, virtual, and cloud environments.

    In this webinar, data center security expert Christina Hausman (Product Marketing Manager, Cisco Data Center Security) will share with you how to:

    - Identify gaps in your data center security posture
    - Gain visibility and control over custom data center applications
    - Address the full attack continuum before, during, and after an attack
    - Manage traffic flows securely between devices and data centers
    - Adapt fluidly as data centers and threat landscapes evolve
    - Reduce risk and accelerate business outcomes
  • Fighting Claim Fraud with InsurTech Live 60 mins
    Ina Yulo (BrightTALK), John Erik Setsaas (Signicat), John Egan (Anthemis Group), Jason Peto (360global net)
    When it comes to analysing and managing insurance claims, the market still runs in a very old school manner — human intervention, lots of paperwork and phone calls. This unfortunately also poses a real threat when it comes to fraudulent claims and applications. With digital advances and the rise of InsurTech, these risks can be minimised and fraudulent applications detected way before they can do any harm.

    Join this panel where we’ll discuss:
    -How predictive analytics can help spot fraudulent applications before they can do proper damage
    -How new technologies can help investigate and monitor specific claims
    -The need for more transparency throughout the claiming process and the importance of identity validation
    -Improving the customer journey by empowering the individual to report and settle claims online or through mobile devices
  • Ransomware: The Darker Side of Bitcoin Recorded: Jul 27 2016 61 mins
    JP Vergne (Scotiabank Lab, Ivey B-School), Alexander Hinchliffe (Palo Alto), Samee Zafar (Edgar Dunn) Mark Lavender (BT)
    Bitcoin has been making remarkable breakthroughs in the currency world. Its ability to allow users to be fully in control of their transactions along with its no-borders transfer policy have made it attractive to both investors and consumers alike.

    However, recent reports have revealed a darker side to Bitcoin. The cryptocurrency is being hoarded by financial institutions as ransom money to pay off potential cyber attackers. Has Bitcoin officially crossed the line and now become a black market currency? Has its untraceable nature inspired the new generation of cyber criminals to initiate unprecedented levels of targeted Ransomware attacks?
    Join this panel of industry-leading speakers, who'll be discussing the following:

    -Why has Bitcoin-related ransomware become more popular in recent years?

    -How can you prevent a Ransomware outbreak in your organisation?

    -Is it possible to catch and subsequently prosecute blockchain criminals?

    -How can authorities and financial institutions adopt and adapt in the face of rising levels of Ransomware threats?
  • Up and Running in AWS, Now What About Security? Recorded: Jul 21 2016 54 mins
    Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture
    For many businesses, security, compliance and data protection in the cloud have been a major challenge due to the shared responsibility model and automation of public cloud infrastructure. Trying to force fit traditional security tools into an agile infrastructure like AWS can be time consuming and clumsy, and ensuring consistent security controls requires new practices for security and auditing teams.

    Register for this impactful webinar presented by Oliver Pinson-Roxburgh, EMEA Director of Solutions Architecture at Alert Logic, as he walks through the vital AWS security best practices you need to know about and how to design your application security strategy so that it integrates with AWS.

    Securing AWS Tried and Tested Continuous Security Strategy:
    • Tradition is out: where traditional security does and doesn’t fit
    • Where to start: what to do within the first 5 minutes of setting up your AWS account
    • Visibility into your AWS infrastructure where to go to get security value
    • Top AWS Security Best Practices
  • Next Generation Fraud Protection and Detection Recorded: Jul 20 2016 60 mins
    Pierre Suhrcke (Pascal Capital), Deepak Dutt (Zighra), Sunil Madhu (Socure)
    - All goes mobile
    - Cybersecurity Threats such as identity thefts , hacking on the rise
    - Security the key success driver for FinTech and InsurTech
    - What are the solutions?
    - Overview of main players
    - Can the industry win the battle against the fraudster?
    - How does the future look like?
  • Security practices for safe mobile money transfers Recorded: Jul 20 2016 62 mins
    Tom Meredith (SmartToken Chain), Ali Raza (CCG Catalyst)
    Every person on the planet has a mobile phone, but 2 Billion people are “Un-banked”.
    Banks and telecoms are in a Gold Rush to bank the unbanked, but many obstacles remain. Money transfers are some of the most popular transactions made by both the banked and the unbanked. However, building trust in this new service is definitely a challenge.

    Join this panel where discussion points will include:

    -Who has the upper hand: Banks or Carriers?
    -How can Fintech companies ensure trust and security when it comes to mobile money transfers?
    -Global ISO Standards Authenticate ID and Asset Verification
    -ISO Reduces Fraud and Speeds up Asset Transfers
    -What are some of the security challenges new payment services are able to overcome?
    -Are “Standards” emerging to reduce implementation and compliance costs?
    -How do you create cross-border and Inter-bank/carrier transactions?
    -How can banks and telecoms successfully bank the unbanked?
  • Mobile Payments: Disruptive innovations or security threat? Recorded: Jul 20 2016 62 mins
    Kristian Sørensen, Mario Maawad (CaixaBank), Giles Sutherland (Carta), Douglas Kinloch (Inside Secure), Jose Caldera
    With more and more people using their phones to conduct business and make transactions, concerns around security have also increased.

    During the session, we will discuss:

    Is hardware security a thing of the past?
    Will tokenisation solve security issues or introduce new problems?
    How do you secure your app?
    How do you balance security with convenience?
    Will biometrics make secure solutions easier to use?
    The end user perspective - are consumers driven by security or by trust?
    Future outlook - are we heading in the right direction security wise?
  • Bigger Bang for the Buck: Agility with Security for Financial Services Recorded: Jul 19 2016 43 mins
    Maya Malevich - Director, Product Marketing Tufin and John Parmley- Area Vice President - US West, Tufin
    For many financial services organizations, security and risk management is a necessary evil that slows down IT's ability to keep up with business needs. The conflict between security and agility becomes even greater with adoption of hybrid cloud platforms. While agility should be maintained, security and compliance become even more challenging.

    By automating and orchestrating network security policies across physical and hybrid cloud platforms, it is possible to maximize both agility and security simultaneously.

    Join us for this session to understand how network security change automation with inherent policy controls can help you stop the balancing act between agility and security and maximize both for your business.
  • Applying Web Isolation to Prevent Advanced Threats Recorded: Jul 14 2016 43 mins
    Dan Amiga, CTO and Co-Founder, Fireglass
    Conventional security solutions have been failing in preventing advanced threats. Join to learn how web isolation is revolutionizing cyber-security by indisputably eliminating critical attack vectors including browsers, emails and documents
  • Office 365 Security and Compliance – Enforcing the 4 Layers of Trust Recorded: Jul 13 2016 50 mins
    Brandon Cook and Srini Gurrapu of Skyhigh Networks
    Office 365 usage has tripled in the last 9 months as more and more companies enable anytime, anywhere access to Microsoft’s suite of cloud services. But security and compliance require a new level of granularity when users access cloud-based systems of record from a variety of networks, locations, and devices.

    In today’s cloud-first, mobile-first world, IT Security teams are creating variable trust models based on user, device, activity, and data sensitivity. In this session, we’ll share the proven 4-layer trust model for security and compliance in O365.
  • Protecting employees on the move with cloud-friendly application segmentation Recorded: Jul 13 2016 52 mins
    Paul German of Certes Networks
    Changed business practices, such as employees working on the move and the adoption of the cloud and cloud resources, should be mirrored by a change in security strategies. Organizations are commonly reluctant to adopt cloud technologies over concerns with security and control over enterprise data. However at the same time, many of these same organizations opened up access to applications for employees on the move, users on personal devices, external contractors, and other third parties that created a significantly larger attack surface than cloud services would have. To combat these threats, a number of cloud-friendly segmentation and application isolation techniques can be deployed to allow organizations to safely use the cloud whilst reducing their attack surface. Specifically, application segmentation via software-defined security represents a technique to accommodate borderless applications, adoption of the cloud, and modern user behaviours.

    Paul German, VP in EMEA, will discuss how the challenges presented by the next generation of information security can be overcome with practical examples and best practice tips.
Your Resource for Information Security Trends & Education
With over 280,000 members, the Information Security Community is the largest community of cybersecurity professionals in the industry. Let's build a network that connects people, opportunities, and ideas. If you are involved in purchasing, selling, designing, marketing ... or using information security solutions - this group is for you. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Mobile Security: From a Management Perspective
  • Live at: Jul 11 2012 2:00 pm
  • Presented by: Steven Ackx, Director, Ascure (a subsidiary of PwC Advisory Services)
  • From:
Your email has been sent.
or close