Featured
Minimize risk: get better wireless visibility & control
Chris Goettl (Ivanti), Richard Stein (Verizon)
Organizations' security teams say they know when employees use their personal devices for work, a practice called BYOD (bring your own device). Ivanti’s research suggests otherwise. What does it take to run a best-in-class cybersecurity organization and what do the most effective organizations do differently?
Join our experts from Ivanti and Verizon to learn more about:
- The persistence of remote and hybrid work and what impact that has on asset management, BYOD and cybersecurity
- Modern device management, modern work enabled for mobile
- What to look for when sourcing a vendor to provide your security before a security breach
- Addressing the pain points of a triple digit increase year over year in the exploitation of vulnerabilities
All episodes
-
2024 Mobile Security Index: Key Findings
Verizon
Introducing 2024 Mobile Security Index (MSI). Join us to be the first to hear from our panel of experts on the rising challenges organizations face with mobile and IoT security and learn steps you can take to help protect your organization.
-
2024 Mobile Security Index: Mobile and IoT trends
Aaron Webb (Jamf), Chris Goettl (Ivanti), Hank Schless (Lookout), Matt Bolick (Fortinet), Richard Stein (Verizon)
In today’s rapidly evolving landscape, securing mobile devices and the expanding Internet of Things (IoT) ecosystem is paramount. This interactive webinar brings together industry-leading experts from Verizon, Fortinet, Ivanti, Jamf and Lookout to discuss the latest trends, challenges and best practices for protecting your organization’s mobile and IoT assets.
Key Topics:
- Emerging mobile and IoT threats and vulnerabilities
- Implementing a holistic approach to mobile and IoT security
- Best practices for securing mobile devices and IoT deployments
- Q&A with industry experts -
Anywhere work is our new reality; A modern workplace needs modern mobile security
Richard Stein (Verizon), Wayne Treadwell (Jamf)
Remote work and cloud computing define the modern workplace, and IT and security challenges are evolving rapidly, especially on mobile. The rising mobile threat landscape and the increasing prevalence of phishing attacks make it imperative for organizations to ensure their mobile devices are secure. Did you know that many mobile devices in organizations go unprotected? Jamf is not only a leader in mobile device management and security, but also a pioneer as a fully remote-first company.
Don’t miss this opportunity and join our webinar with Jamf and Verizon to learn:
- How Jamf is innovating and enhancing ‘manage & secure’ solutions to stay agile and elevate mobile security.
- Learn about our cutting-edge approaches in Content Filtering, Mobile Threat Defense, and ZTNA delivering a zero trust experience we call Trusted Access.
- See how Jamf solutions effectively combat mobile threats and phishing attacks, with comprehensive protection for all mobile devices in your organization.
-How Jamf is helping organizations simplify mobile security for work and protect their mobile workforce in this new era of anywhere work. -
The Modern Kill Chain: How Attacks Have Gone From Months to Minutes
Richard Stein (Verizon), David Richardson (Lookout)
Verizon’s MSI 2024 report states that 89% of respondents believe organizations need to take mobile device security more seriously. With threat actors targeting mobile devices as a way to bypass an organization's security controls, organizations must be able to detect and respond to the full range of mobile threats, from SMS phishing attacks to malicious applications and network compromises. Join experts from Lookout and Verizon to learn why breaches are now happening in minutes, not months.
Join us to learn about:
- How the traditional cyber kill chain has evolved to exploit mobile users
- Why attacks utilizing a mobile device are increasing
- What makes your organization vulnerable to a modern-day attack
- Why stopping breaches requires the ability to identify anomalous data movements
- The three key capabilities you need to defend against modern breaches -
Minimize risk: get better wireless visibility & control
Chris Goettl (Ivanti), Richard Stein (Verizon)
Organizations' security teams say they know when employees use their personal devices for work, a practice called BYOD (bring your own device). Ivanti’s research suggests otherwise. What does it take to run a best-in-class cybersecurity organization and what do the most effective organizations do differently?
Join our experts from Ivanti and Verizon to learn more about:
- The persistence of remote and hybrid work and what impact that has on asset management, BYOD and cybersecurity
- Modern device management, modern work enabled for mobile
- What to look for when sourcing a vendor to provide your security before a security breach
- Addressing the pain points of a triple digit increase year over year in the exploitation of vulnerabilities