
The battleground is mobile: Combating sophisticated mobile attacks
From gateway to protective wall: Why smartphones are the key to bad or good IT security and how you can best equip yourselves.
Topic
Endpoint ProtectionMobile SecuritySecure Homeoffice
When & Where
Details
Format:
Management lecture
Session description
Mobile devices are used throughout the day for various professional and personal tasks. Using apps, you can do everything from emails to meetings with the tap of a finger in the palm of your hand. Smartphones contain professional and personal data, act as 2-factor authentication devices and are constantly connected to the internet, making them an ideal target for hacking.
The most dangerous zero-click and zero-day exploits access an endpoint remotely and can activate the camera and microphone completely unnoticed. We present solutions that put an end to such threats on a forensic level.
The International Forum is also available as a livestream. Follow  ...
Moderator
