John
Girard
+
THE DEMOFORUM
Present:
MAR 26 - AUG 29
SIM hijacking and you: Caller ID is no longer a reliable indicator of who is REALLY on the other end of the line
Mitigating threats from unsecured Mobile Apps. Real world examples and a few hypotheticals
Hey, mobile—AI and ML are coming for you! Keeping up with the mobile app threat landscape
BYOD: Managing Devices that aren't mine
Complex Password Challenges on Mobile Devices
Rogue Cellular Tower Spoofing Puts the Adversary in the Middle without you Knowing
Sophisticated Malware on the Move Gets your Data, Credentials, and System Access from Anywhere
Phishing, Smishing, and Vishing: Sophisticated attacks are not as easy to visually detect on mobile devices
Tracking Data Loss Via Mobile Devices and the Challenges We Face
Securing Devices out of your hands and out of your users hands: What to do When A Device is Stolen
SIM hijacking and you: Caller ID is no longer a reliable indicator of who is REALLY on the other end of the line
BLACKHAT WARMUP
Wi-fi is Everywhere, but its not safe: Securing your mobile connection regardless of where you're connected
BLACKHAT ROUND UP
Mobile: the Giant Blind Spot in Cyber. Why and what’s to be done?
BLACKHAT ROUND UP
BYOD: Managing Devices that aren't mine
BLACKHAT ROUND UP
Sophisticated Malware on the Move Gets your Data, Credentials, and System Access from Anywhere
Phishing, Smishing, and Vishing: Sophisticated attacks are not as easy to visually detect on mobile devices
Tracking Data Loss Via Mobile Devices and the Challenges We Face
Securing Devices out of your hands and out of your users hands: What to do When A Device is Stolen
SIM hijacking and you: Caller ID is no longer a reliable indicator of who is REALLY on the other end of the line
Wi-fi is Everywhere, but its not safe: Securing your mobile connection regardless of where you're connected
Who is Guarding the Shop? Protecting your MDM Solution from compromise
BYOD: Managing Devices that aren't mine
Complex Password Challenges on Mobile Devices
Rogue Cellular Tower Spoofing Puts the Adversary in the Middle without you Knowing