Android Application Security: Hacking and Defending Mobile Apps

AppSec Labs

Mobile applications handle our most sensitive data – phone calls, SMS, geographic locations, financial information… the question is – can we really tell they’re secure? Who can assure us that they are not being spied upon? Can they be abused?
Watch Now

Spotlight

Current BYOD solutions either jeopardize corporate data by allowing data to reside on the device, or they sacrifice the user experience. ZixOne is a mobile app that simplifies the BYOD challenge by enabling easy access to the most used business application on mobile devices - email. The ZixOne app combines a familiar look and feel for the corporate interface with greater speed and security creating an unrivaled user and most importantly does not keep corporate data on the device.


OTHER ON-DEMAND WEBINARS

Access Control: Keeping your friends close and an eye on your not so friendlies

Who is your gatekeeper? Are they trustworthy? Value for most enterprise operations and even small business lies in their infrastructure and accumulated data. The challenge in today’s world is protecting these assets and keeping them safe, without making your facility and process so obtrusive that it is impossible to conduct the activities of the business. How do you insure that these are safe? The simple answer is “Access Control” . Controlling who has access to the assets of your business, when and where, is of prime concern for any IT/IA professional. This workshop will review the various methodologies that are used to achieve that goal, their levels of assurance, and the cost and ease of implementing them
Watch Now

"The Changing Role of the Chief Information Security Officer"

Veracode

In this special videocast sponsored by Veracode and moderated by Dark Reading, two of the IT security industry’s best-known voices – Chris Wysopal, CTO & CISO of Veracode and Jim Nelms, CISO of The Mayo Clinic – will discuss the changing role of the CISO and how the importance of that role is growing within the organization.
Watch Now

Legal Requirements in Third Party Cyber Risk Management

"In recent years, third party cyber risk management has become increasingly challenging as businesses become interconnected. Major breaches caused by insecure third parties have raised public awareness of the problem. New legal requirements are shaping the way that organizations build and monitor their third party cyber risk management programs. Join Jake Olcott, VP of Business Development at BitSight, Lisa Sotto, Partner at Hunton & Williams LLP, and Robert Metzger, Shareholder at Rogers Joseph O'Donnell as they discuss some of the legal precedents and requirements in this emerging field. Attendees will learn about: - Existing and evolving legal obligations to manage the cyber risk of third parties and vendors in industries like retail, healthcare, defense, and finance. - Issues that lawyers face in helping organizations manage third party cyber risk, including negotiating contract requirements for breach notification, assessing written questionnaires, and performing on-site vendor risk assessments. - Emerging ""standards of care"" for third party cyber risk management"
Watch Now

"Using Your Network and Cisco ASR 9000 for Comprehensive DDoS Protection"

"DDoS attacks are rising in size, frequency and complexity; recent research from Arbor Networks discovered a 334 Gbps DDoS attack! What makes this concerning is that there isn’t a single DDoS protection product on the planet that can stop an attack of this magnitude. So what’s the solution? You need to leverage your network to stop DDoS attacks. In this session, representatives from two industry leaders – Talbot Hack from Arbor Networks and Mike Geller from Cisco Systems – discuss best practices in leveraging your network for DDoS detection and mitigation."
Watch Now

Spotlight

Current BYOD solutions either jeopardize corporate data by allowing data to reside on the device, or they sacrifice the user experience. ZixOne is a mobile app that simplifies the BYOD challenge by enabling easy access to the most used business application on mobile devices - email. The ZixOne app combines a familiar look and feel for the corporate interface with greater speed and security creating an unrivaled user and most importantly does not keep corporate data on the device.

resources