Mobile Devices: What Could Possibly Go Wrong? Lessons from the Frontlines

Share with your network!

Next week the cybersecurity industry will converge on San Francisco for the annual RSA Conference—and next Tuesday afternoon I’ll be leading a discussion on how organizations are dealing with hidden BYOD risks from mobile apps and WiFis that employees visit. We will be diving into the real risks, attacks and vulnerabilities that the mobile vendors don’t necessarily want you to know about. I encourage you to join in this interactive conversation. There won’t be any PowerPoint – it’s an interactive discussion around the real risks.

Email access is usually granted to personal devices, and is often accompanied by access to calendars and corporate address books, and sometimes to internal web resources, fileshares and apps. All of which can pose a threat to organizations if not properly secured. Employees can download apps from legitimate app stores that send your corporate data to companies or countries that you do not want to have it. And sideloaded apps and SMS messages can deliver malicious payloads to mobile users.

I will facilitate this session, but it’s about you and your experiences with mobile threats. At Proofpoint we have analyzed more than 30 million apps on iOS and Android. Let’s use that as insight on what apps are actually doing, where they are sending corporate data, and what controls are actually in place within many organizations.

Below are my Peer2Peer session details and a link to reserve a seat. I hope to see you in the session and encourage attendees to connect with me directly with any mobile security questions as well.

Mobile Devices: What Could Go Wrong? Discussion from the Frontlines – Learn how your peers are dealing with hidden BYOD risks

Tuesday, February 14: 2:30 p.m. PT

Marriott Marquis | Nob Hill B 

Click here for more information and to reserve a seat.

Click here for more information Proofpoint and the RSA Conference 2017.

Subscribe to the Proofpoint Blog