8 ways attackers target mobile apps to steal your data (and how to stop them)

On-Demand Webcast|1 hour

Mobile apps have become indispensable tools, but they also pose significant security threats. You’d be surprised how many millions of downloads some risky apps have, exposing users and organizations to exploitable vulnerabilities. These risks range from collecting data well beyond what is necessary  to leaking Personally Identifiable Information (PII) and everything in between. 

This panel webcast will help security practitioners identify such threats, protect data and fortify mobile security by exploring the following 8 types of risky mobile apps, including the attack processes and advantages for bad actors:

  • Overprivileged
  • Harvester 
  • Colluding
  • Shifty
  • Sloppy
  • Leaky
  • Chatty
  • Sticky

Speakers

Nikos Kiourtis
Chief Technology Officer
Quokka

Nikos Kiourtis is the Chief Technology Officer at Quokka, leading the company’s engineering and research & development teams. Prior to Quokka, he was a Research Assistant Professor at George Mason University and a Guest Researcher at NIST. Nikos holds a Degree in Mathematics, a MSc in Theoretical Computer Science, and a PhD in Computer Science.

Vijay Pawar
SVP of Product
Quokka

Vijay has been with Quokka for over a year and currently serves as the SVP of Product. Vijay has over 20 years of experience in security and enterprise software driving innovation and technology disruption. He brings expertise in Identity & Access Management (IAM), Unified Endpoint Management (UEM) and Mobile Security.

Joshua Copeland
Director of Managed Security Services
Quadrant Information Security

Joshua Copeland is a battle-tested cybersecurity expert with a wealth of experience in the field, currently servicing as the Director of Managed Security Services at Quadrant Security. He is a 20-year veteran of the Air Force and has served in leadership roles with Bose, AT&T, and GDIT, focusing on security operations, governance, and the cloud. He is a sought-after guest speaker at prestigious conferences such as BlackHat, BSides, and RSAC, and his expertise makes him a highly coveted guest for podcasts and webinars. Joshua is also a member of the adjunct faculty at Tulane University, teaching cybersecurity and leadership.

Mike Shema
Tech Lead
Block

Mike Shema is a Tech Lead at Block.

Sponsors

Quokka
0%