Mobile Security Webinars

On Demand

mHealth’s Responsibility for Patients’ Digital Lives

mHealth’s Responsibility for Patients’ Digital Lives

Speakers: Chris Dworkin (GM, In-App Security) and JT Keating (Vice President of Product Strategy)
Date & Time: On Demand

Top Mobile Security Predictions for 2019

Top Mobile Security Predictions for 2019

Speaker: JT Keating (Vice President of Product Strategy)
Date & Time: On Demand

How to Deliver Secure Mission Critical Mobile Apps with Zimperium and 3rd Eye Technologies

How to Deliver Secure Mission Critical Mobile Apps with Zimperium and 3rd Eye Technologies

Speakers: JT Keating (Zimperium's Vice President of Product Strategy); Chris Dworkin (Zimperium's GM of mobile application security) and Ron Huda (3rd Eye Technologies' CEO)
Date & Time: On Demand

Top Mobile Security Surprises of 2018

Top Mobile Security Surprises of 2018

Speaker: JT Keating (Vice President of Product Strategy)
Date & Time: On Demand

Protecting Finance Mobile Apps Against Hackers & Reducing Fraud

Protecting Finance Mobile Apps Against Hackers & Reducing Fraud

Speakers: Chris Dworkin (GM, In-App Security) and JT Keating (Vice President of Product Strategy)
Date & Time: On Demand

2018 Report: Enterprise Mobile Device Attacks and Threats

2018 Report: Enterprise Mobile Device Attacks and Threats

Speakers: JT Keating (Vice President of Product Strategy) and Scott King (Director of Customer Advocacy)
Date & Time: On Demand

zIAP Introduction: Enterprise Grade Mobile App Security in Less Than 10 Minutes

zIAP Introduction: Enterprise Grade Mobile App Security in Less Than 10 Minutes

Speakers: Chris Dworkin (GM, In-App Security) and JT Keating (Vice President of Product Strategy)
Date & Time: On Demand

Mobile Threats: A Summary Analysis of Customer Data Across Industries

Mobile Threats: A Summary Analysis of Customer Data Across Industries

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Real World Examples: Protecting an Oil & Gas Company from Mobile Threats

Real World Examples: Protecting an Oil & Gas Company from Mobile Threats

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Real World Examples: Mobile Threats Detected at a Hospital

Real World Examples: Mobile Threats Detected at a Hospital

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Can a Corporate Network Get Hacked Via a Smartphone? Hint: Yes! Here’s How It Happened

Can a Corporate Network Get Hacked Via a Smartphone? Hint: Yes! Here’s How It Happened

Speakers: Andrea Pierini (Penetration Tester) and JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Real World Examples: Protecting City Government Employees from Mobile Threats

Real World Examples: Protecting City Government Employees from Mobile Threats

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Real World Examples: Mobile Threats Detected at Law Firms

Real World Examples: Mobile Threats Detected at Law Firms

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

The Mobile Menace Most Wanted List: #1 OS Exploits

The Mobile Menace Most Wanted List: #1 OS Exploits

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

The Mobile Menace Most Wanted List: #2 Rogue Profile

The Mobile Menace Most Wanted List: #2 Rogue Profile

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

The Mobile Menace Most Wanted List: #3 Phishing

The Mobile Menace Most Wanted List: #3 Phishing

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

The Mobile Menace Most Wanted List: #4 Bad WiFi

The Mobile Menace Most Wanted List: #4 Bad WiFi

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

The Mobile Menace Most Wanted List: #5 MITM

The Mobile Menace Most Wanted List: #5 MITM

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

The Mobile Menace Most Wanted List: #6 Malicious App

The Mobile Menace Most Wanted List: #6 Malicious App

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

The Mobile Menace Most Wanted List: #7 Risky App

The Mobile Menace Most Wanted List: #7 Risky App

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

How to Protect Billions Against Mobile Banking Fraud

How to Protect Billions Against Mobile Banking Fraud

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

The State of Mobile Device Threats: 2018 H1 Mobile Threat Report

The State of Mobile Device Threats: 2018 H1 Mobile Threat Report

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Here phishy, phishy, phishy!

Here phishy, phishy, phishy!

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Addressing the Emerging Mobile Cybersecurity Threats Facing State and Local Governments

Addressing the Emerging Mobile Cybersecurity Threats Facing State and Local Governments

Speakers: Karen Jackson, Former Secretary of Technology for the Commonwealth of VA and Chul Yim, Zimperium's Director of State & Local Government Accounts
Date & Time: On Demand

It’s Been a Month Since the GDPR Deadline. How’s it Going for You?

It’s Been a Month Since the GDPR Deadline. How’s it Going for You?

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Mobile Security On-device or in the Cloud? Hackers Have a Preference.

Mobile Security On-device or in the Cloud? Hackers Have a Preference.

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Mobile Security: Rise of the Machine (Learning)

Mobile Security: Rise of the Machine (Learning)

Speaker: John Michelsen, Chief Technology Officer
Date & Time: On Demand

Zimperium’s EMM integration with BlackBerry

May is EMM Month | Zimperium & BlackBerry

Speakers: JT Keating, Vice President of Product Strategy and Matt Gueiros, Principal Technical Solutions Manager at BlackBerry
Date & Time: On Demand

Zimperium’s EMM integration with MobileIron 

May is EMM Month | Zimperium & MobileIron

Speakers: JT Keating, Vice President of Product Strategy; Kern Smith, Director of Sales Engineering and Chris Dobrec, VP of Marketing at MobileIron
Date & Time: On Demand

Zimperium’s EMM integration with Citrix XenMobile

May is EMM Month | Zimperium & Citrix XenMobile

Speakers: JT Keating, Vice President of Product Strategy and Jon Blackman, Director of Presales Engineering
Date & Time: On Demand

Zimperium’s EMM integration with VMware Workspace ONE powered by AirWatch

May is EMM Month | Zimperium & VMware AirWatch

Speakers: JT Keating, Vice President of Product Strategy and Jon Blackman, Director of Presales Engineering
Date & Time: On Demand

Zimperium’s EMM integration with Intune

May is EMM Month | Zimperium & Microsoft Intune

Speakers: JT Keating, Vice President of Product Strategy and Jon Blackman, Director of Presales Engineering
Date & Time: On Demand

2018 Enterprise Mobile Device Attacks and Threats

You're Not Seeing Mobile Attacks & You Never Will Unless You Make This Change

Speakers: JT Keating, Vice President of Product Strategy and John Michelsen, Chief Technology Officer
Date & Time: On Demand

NIS Directive: Meeting NCSC’s Mobile Security Guidance

NIS Directive: Meeting NCSC’s Mobile Security Guidance

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Banking Information is at Risk of Theft on Mobile Devices. What Can be Done About it?

Banking Information is at Risk of Theft on Mobile Devices. What Can be Done About it?

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Enterprise Mobile Threat Defense Platform Zimperium 5.0

Enterprise Mobile Threat Defense Platform Zimperium 5.0

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

Compliance and Mobile Devices: The Forgotten Endpoint

Compliance and Mobile Devices: The Forgotten Endpoint

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

2018 Enterprise Mobile Device Attacks and Threats

2018 Report: Enterprise Mobile Device Attacks and Threats

Speakers: JT Keating, Vice President of Product Strategy and Scott King, Director of Customer Advocacy
Date & Time: On Demand

Protect Your Customers from BankBot

Protect Your Customers from BankBot

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: On Demand

How to Calculate Risk of Your Mobile Endpoints

How to Calculate Risk of Your Mobile Endpoints

Speakers: John Michelsen, Chief Product Officer and Phil Hochmuth, Program Director, IDC’s Enterprise Mobility
Date & Time: On Demand

Mobile Devices are Endpoints Too

Mobile Devices are Endpoints Too

Speakers: John Michelsen, Chief Product Officer and Andrew Kellett, Principal Analyst, Ovum
Date & Time: On Demand

How to Balance Mobility, Security and Privacy

How to Balance Mobility, Security and Privacy

Speakers: John Michelsen, Chief Product Officer and Chris Marsh, Research Director, 451 Research
Date & Time: On Demand

Enter the Mind of the Mobile Hacker Presented by MobileIron and Zimperium

Enter the Mind of the Mobile Hacker Presented by MobileIron and Zimperium

Speakers: Jon Paterson, VP Sales Engineering and Mike Raggo, Director Security Research, MobileIron
Date & Time: On Demand

Enhance Mobility Management with Cyber Protection Presented by AirWatch and Zimperium

Enhance Mobility Management with Cyber Protection Presented by AirWatch and Zimperium

Speakers: Jon Paterson, VP Sales Engineering and Brian Katz, Director of Mobile Strategy, VMware
Date & Time: On Demand

Modern Mobile Threats Presented by Enterprise Mobile and Zimperium

Modern Mobile Threats Featuring Enterprise Mobile

Speakers: John Michelsen, CPO and Amanda Butlett, Mobility Services Director, Enterprise Mobile
Date & Time: On Demand

Modern Mobile Threats Zimperium Webinar featuring Gartner

Modern Mobile Threats Featuring Gartner

Speakers: John Michelsen, CPO and Patrick Hevesi, Research Director, Gartner
Date & Time: On Demand

Does Your BYOD Policy Allow Bad Apps?

Does Your BYOD Policy Allow Bad Apps?

Speaker: John Michelsen, CPO
Date & Time: On Demand

The Biggest Threat To Enterprises Comes on the Smallest Screen

The Biggest Threat to Enterprises Comes on the Smallest Screen

Speakers: Zuk Avraham, Founder, CTO and Patrick Murray, VP Products
Date & Time: On Demand