81 past events found
+ 1 upcoming event found
Back to Search Begin New Search Save Search Auto-Notify
Zimperium: How to Protect Your Enterpri...
How to Protect Your Enterprise Against the Pegasus Attack Best practices from detecting & defeating the spyware since 2016 August 5, 202111am EDT / 4pm UTC+130 Minutes According to recent reports, mobile devices of 50,000 individuals from 50 countries have been under attack by a new variation of an aggressive mobile spyware known as Pegasus. Enterprise security professionals need to know how to protect their mobile endpoints, and ultimatel...
August 5, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Intangibles when Building out your DevS...
Hear from your peers during this interactive panel discussion! Application Security (AppSec) programs are critical to preventing costly and damaging breaches or cyberattacks – especially in government and education sectors where private information is abundant. But setting up an AppSec program isn’t as easy as checking boxes and installing a new scanning tool; it’s a journey that entails security-minded messaging from the to...
July 22, 2021
Organizer: Veracode, Inc.
Location: Webcast
Add Favorite
From Zero Trust to O365: IT Leader's Gu...
For years, financial services organizations have been using mobile devices to enable productivity and improve customer service. With the reliance on the remote workforce over the last year, mobile devices have become even more critical for everything from Zero Trust to providing distributed access to Microsoft O365.But the shift to mobile has also created security and compliance risks that need to be addressed.Tune in for a special fireside c...
June 30, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Protecting BYO Mobile Devices within Ze...
ATARC Presents in Partnership with Zimperium An open discussion with experts from the National Institute of Standards and Technology (NIST), the MITRE Corporation, and U.S. Department of Defense. The distributed workforce has changed the face of cybersecurity, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world… even on BYO mobile devices. Recently, the National...
June 9, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
#1 Way to Reduce Mobile Fraud (That You...
Traditional approaches for fraud prevention rely heavily on user, account, and transaction data. But for transactions that originate from a mobile app, very little is known about the health of the mobile device. This is the most important cause of mobile fraud… one that is a growing problem considering that a significant amount of mobile fraud occurs on the device via malware, bots, and emulators. The only way to combat these sophistic...
May 26, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
From Telemedicine to O365, Protecting H...
For years, healthcare organizations have been using mobile devices to enable productivity and improve patient care. With the pandemic, mobile devices have become even more critical for everything from telemedicine to providing distributed access to Microsoft O365. But the shift to mobile has also created security and compliance risks that need to be addressed. Please join experts from VMware and Zimperium as they outline: The top threats that...
May 18, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Why Are Many Zero Trust Efforts Only 40...
The distributed workforce has changed the face of enterprise security, bringing enhanced access controls like Zero Trust to the forefront, enabling employees to be productive anywhere in the world. For enterprises to truly implement the ‘always verify, never trust’ model of Zero Trust architecture, they must gather accurate telemetry data from all endpoints, including mobile, and address major gaps in enterprise security and data a...
April 29, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
CMMC: The Most Important Change In Regu...
The New CMMC Requirement will impact every government contractor. If you are an existing prime contractor, a subcontractor or brand new to the government market, you will be required to implement the CMMC standards at some point. If you don’t have it in place, you may not be able to bid on most DoD projects and eventually any government contract. What you will learn: · What is CMMC or Cybersecurity Maturity Model Certification ...
April 28, 2021
Organizer: Government Contractors Association, Inc.
Location: Webcast
Add Favorite
Meeting The Cyber Challenges for the Fu...
Electrosoft Services, Inc. in collaboration with the non-profit associaiton, ITPA-NCC, will host our "3rd in the series" of virtual, half-day webinars on "Meeting the Cyber Challenges for the Future". As part of our ongoing series, this three-hour summit will showcase government and industry thought leaders with focus on Identity, Credential and Access Management (ICAM) and Zero Trust. Through our distinguished keynote speaker and two panels,...
April 22, 2021
Organizer: Electrosoft Services, Inc.
Location: Virtual
Add Favorite
Malicious Apps are Attacking Your Mobil...
Mobile is now the most important digital channel for your business. Yet everyday we hear of another app breach that exposed PII, enabled fraud or put the enterprise system at risk. The main culprit is mobile malware. Anubis, Cerberus, Blackrock, Eventbot and the list goes on and on. The result, fraud, data theft, reputation damage or financial losses. Whether it's by abusing permissions, impersonating brands or exploiting vulnerabilities, malw...
April 21, 2021
Organizer: Zimperium Inc.
Location: Webcast
Add Favorite
Back to Search Begin New Search