Skip to main content [aditude-amp id="stickyleaderboard" targeting='{"env":"staging","page_type":"article","post_id":1506775,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,cloud,enterprise,entrepreneur,mobile,security,","session":"B"}']

VentureBeat Webinar: Mobile app security in a BYOD organization

Image Credit: Shutterstock

Join us for this live event on Wednesday, August 7 at 10 am Pacific.

You can’t escape mobile apps: Your workforce is already carrying the latest smartphones and tablets, and so are your customers. Sure, strict BYOD policies and app management may fit basic requirements, but smart IT pros know that those aren’t enough.

[aditude-amp id="flyingcarpet" targeting='{"env":"staging","page_type":"article","post_id":1506775,"post_type":"story","post_chan":"none","tags":null,"ai":false,"category":"none","all_categories":"business,cloud,enterprise,entrepreneur,mobile,security,","session":"B"}']

Your marketing team might already be thinking about developing its own apps with hired developers, which could potentially put your users and company at risk. Even the most popular and successful apps are insecure with man-in-the-middle vulnerabilities and poor data storage practices. How do you prevent your organization’s mobile app from being the next big data privacy breach?

According to Gartner, in the next three years, 75 percent of mobile security breaches will be the result of mobile application misconfiguration.

“Mobile security breaches are and will continue to be the result of misconfiguration and misuse on an app level, rather than the outcome of deeply technical attacks on mobile devices,” principal research analyst Dionisio Zumerle said.

“A classic example of misconfiguration is the misuse of personal cloud services through apps residing on smartphones and tablets. When used to convey enterprise data, these apps lead to data leaks that the organization remains unaware of for the majority of devices.”

In this webinar, experts will discuss the latest malware and app reverse engineering threats to mobile app security. We’ll cover tips and best practices from rock solid mobile app use cases and arm you with the latest strategy to keep your organization’s mobile app rock solid – while preventing one of those punitive lock downs that would hamper the user experience.

Sign up free!

Speakers:

  • Sky Sharma, CIO/CKO, Information Systems and Technology Branch, US Air Force
  • John Millican, former CISO, Expedia and Hotwire
  • Tyler Shields, senior analyst, Forrester Research
  • Sean Wisdom, Director, Global Mobility Solutions Marketing, Dell

After this one-hour webinar, you’ll:

  • Understand the current threat landscape, including mobile malware and app reverse engineering,
  • Know how to retrain your security teams to securely develop mobile apps,
  • Be able to target your mobile security strategy to protect not just the apps and the data but also the device, and
  • Possess an arsenal of ways to add security at the app level and provide mobile access to business apps safely.

You can register free here.