
Format:
Management lecture
Mobile devices are used throughout the day for various professional and personal tasks. Using apps, you can do everything from emails to meetings with the tap of a finger in the palm of your hand. Smartphones contain professional and personal data, act as 2-factor authentication devices and are constantly connected to the internet, making them an ideal target for hacking.
The most dangerous zero-click and zero-day exploits access an endpoint remotely and can activate the camera and microphone completely unnoticed. We present solutions that put an end to such threats on a forensic level.
The International Forum is also available as a livestream. Follow  ...