170 past events found
+ 1 on-demand webcast found
Back to Search Begin New Search Save Search Auto-Notify
Zimperium: How to Protect Your Enterpri...
How to Protect Your Enterprise Against the Pegasus Attack Best practices from detecting & defeating the spyware since 2016 August 5, 202111am EDT / 4pm UTC+130 Minutes According to recent reports, mobile devices of 50,000 individuals from 50 countries have been under attack by a new variation of an aggressive mobile spyware known as Pegasus. Enterprise security professionals need to know how to protect their mobile endpoints, and ultimatel...
August 5, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
From Zero Trust to O365: IT Leader's Gu...
For years, financial services organizations have been using mobile devices to enable productivity and improve customer service. With the reliance on the remote workforce over the last year, mobile devices have become even more critical for everything from Zero Trust to providing distributed access to Microsoft O365.But the shift to mobile has also created security and compliance risks that need to be addressed.Tune in for a special fireside c...
June 30, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
The Journey to Zero Trust: Start with P...
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best pra...
June 24, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting Bring Your Own (BYO) Mobile...
The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) released a practice guide titled Mobile Device Security: Bring Your Own Device. This NIST gui...
June 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting BYO Mobile Devices within Ze...
ATARC Presents in Partnership with Zimperium An open discussion with experts from the National Institute of Standards and Technology (NIST), the MITRE Corporation, and U.S. Department of Defense. The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National...
June 9, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
#1 Way to Reduce Mobile Fraud (That You...
Traditional approaches for fraud prevention rely heavily on user, account, and transaction data. But for transactions that originate from a mobile app, very little is known about the health of the mobile device. This is the most important cause of mobile fraud… one that is a growing problem considering that a significant amount of mobile fraud occurs on the device via malware, bots, and emulators. The only way to combat these sophistic...
May 26, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Edge Computing – A Must for 5G and IOT...
As the federal government evolves into the “new normal” as a result of COVID-19, Federal data architectures have changed to adapt. Edge computing, alongside 5G and IOT, has created the opportunity for more efficient decisioning at the point of events. Data can be analyzed at near real-time speeds, accelerating decisions that impact critical missions and improve government operations. By collecting and processing data closer to the...
May 20, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
From Telemedicine to O365, Protecting H...
For years, healthcare organizations have been using mobile devices to enable productivity and improve patient care. With the pandemic, mobile devices have become even more critical for everything from telemedicine to providing distributed access to Microsoft O365. But the shift to mobile has also created security and compliance risks that need to be addressed. Please join experts from VMware and Zimperium as they outline: The top threats that...
May 18, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Why Are Many Zero Trust Efforts Only 40...
The distributed workforce has changed the face of enterprise security, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world. For enterprises to truly implement the ‘always verify, never trust’ model of Zero Trust architecture, they must gather accurate telemetry data from all endpoints, including mobile, and address major gaps in enterprise security and data a...
April 29, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Malicious Apps are Attacking Your Mobil...
Mobile is now the most important digital channel for your business. Yet everyday we hear of another app breach that exposed PII, enabled fraud or put the enterprise system at risk. The main culprit is mobile malware. Anubis, Cerberus, Blackrock, Eventbot and the list goes on and on. The result, fraud, data theft, reputation damage or financial losses. Whether it's by abusing permissions, impersonating brands or exploiting vulnerabilities, malw...
April 21, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search