72 past events found
+ 2 on-demand webcasts found
Back to Search Begin New Search Save Search Auto-Notify
Zimperium & SD Times- Top Five Best Pra...
It’s 2022, which means any organization that builds or maintains a mobile application, either for end-users or for employees, knows they have a responsibility to secure those applications. However, between fixing privacy, security and compliance risks in the development process and enabling protection from the many different threat vectors while in use, it’s hard to know where to start. Join SD Times for a live webinar to hear from...
February 17, 2022
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Zimperium- Top 5 Risks to Address in th...
Even though there are similarities on how web and mobile apps are used, the risks that mobile apps can pose to an enterprise are fundamentally different. Some risks arise during development and others once the application is published. With multiple solutions needed at different points in the application life cycle, DevSecOps professionals find themselves wondering where to begin and which stages of the software development lifecycle they shou...
November 4, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
How to Improve Federal Mobile Security...
The Federal Mobility Group (FMG), established by the Federal CIO Council, was tasked with improving cybersecurity, governance, and accountability for federal mobile device usage and programs. Co-chaired by mobile leaders from DHS, GSA, and NIST, the FMG sponsors a Federal Information Security Modernization Act (FISMA) Mobility Metrics Working Group (FMMWG) that is focused on updating the FISMA mobility metrics for fiscal year 2022 and beyond....
October 21, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Zimperium- Discover How to Protect Your...
A new variation of the aggressive mobile spyware known as Pegasus, has recently attacked over 50,000 individual mobile devices in 50 countries. Also unforeseen, was Pegasus making more than 1.65 billion Apple* products (in use, worldwide) vulnerable since at least March this year (Zimperium customers are already protected). CISOs and their teams need to know how to protect their mobile endpoints, and ultimately their whole organization, from P...
October 14, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Zimperium: How to Protect Your Enterpri...
How to Protect Your Enterprise Against the Pegasus Attack Best practices from detecting & defeating the spyware since 2016 August 5, 202111am EDT / 4pm UTC+130 Minutes According to recent reports, mobile devices of 50,000 individuals from 50 countries have been under attack by a new variation of an aggressive mobile spyware known as Pegasus. Enterprise security professionals need to know how to protect their mobile endpoints, and ultimatel...
August 5, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
From Zero Trust to O365: IT Leader's Gu...
For years, financial services organizations have been using mobile devices to enable productivity and improve customer service. With the reliance on the remote workforce over the last year, mobile devices have become even more critical for everything from Zero Trust to providing distributed access to Microsoft O365.But the shift to mobile has also created security and compliance risks that need to be addressed.Tune in for a special fireside c...
June 30, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
The Journey to Zero Trust: Start with P...
A successful Zero Trust model enforces continuous authorization by verifying anyone and everything connected to an enterprise system. We’ve seen in recent headline news that little to no control on identity management can be detrimental if attackers gain access to accounts with elevated privileges. How can government agencies implement an effective Identity Security model to minimize risk and keep pace with adversaries? What are best pra...
June 24, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting Bring Your Own (BYO) Mobile...
The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) released a practice guide titled Mobile Device Security: Bring Your Own Device. This NIST gui...
June 9, 2021
Organizer: ATARC
Location: Webcast
Add Favorite
Protecting BYO Mobile Devices within Ze...
ATARC Presents in Partnership with Zimperium An open discussion with experts from the National Institute of Standards and Technology (NIST), the MITRE Corporation, and U.S. Department of Defense. The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National...
June 9, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
#1 Way to Reduce Mobile Fraud (That You...
Traditional approaches for fraud prevention rely heavily on user, account, and transaction data. But for transactions that originate from a mobile app, very little is known about the health of the mobile device. This is the most important cause of mobile fraud… one that is a growing problem considering that a significant amount of mobile fraud occurs on the device via malware, bots, and emulators. The only way to combat these sophistic...
May 26, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search