Mobile Security Webinars

Upcoming

What Exactly is a Mobile <u>Phishing</u> Attack?

What Exactly is a Mobile Phishing Attack?

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: August 28, 2019 at 10:00 am CT (16:00 BST)
Duration: 30 Minutes
Register now

What Exactly is a Mobile <u>Network</u> Attack?

What Exactly is a Mobile Network Attack?

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: September 4, 2019 at 10:00 am CT (16:00 BST)
Duration: 30 Minutes
Register now

What Exactly is a Mobile <u>App</u> Attack?

What Exactly is a Mobile App Attack?

Speaker: JT Keating, Vice President of Product Strategy
Date & Time: September 11, 2019 at 10:00 am CT (16:00 BST)
Duration: 30 Minutes
Register now

In-App Protection Use Cases

In-App Protection Use Cases

Speaker: Scott King, Zimperium's Director of Embedded Security
Date & Time: September 12, 2019 at 10:00 am CT (16:00 BST)
Duration: 30 Minutes
Register now

On Demand

What Exactly is a Mobile <u>Device</u> Attack?

What Exactly is a Mobile Device Attack?

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

Mobile Is Another Endpoint: MITRE ATT&CK Framework for Mobile

Mobile Is Another Endpoint: MITRE ATT&CK Framework for Mobile

Speaker: JT Keating (Zimperium's Vice President of Product Strategy) and Andrew Osborn (Zimperium's Senior Sales Engineer)
Watch Recording

App Shielding vs In-App Protection

App Shielding vs In-App Protection

Speaker: Scott King, Zimperium's Director of Embedded Security
Watch Recording

Mobile Is Another Endpoint: CIS Critical Security Controls for Mobile

Mobile Is Another Endpoint: CIS Critical Security Controls for Mobile

Speaker: JT Keating (Zimperium's Vice President of Product Strategy) and Raleigh Burns (Zimperium's Senior Sales Engineer)
Watch Recording

The State of Mobile Device Threats: 2019 H1 Mobile Threat Report

The State of Mobile Device Threats: 2019 H1 Mobile Threat Report

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

The First FedRAMP “Authority to Operate” MTD Solution: Zimperium Federal Cloud

The First FedRAMP “Authority to Operate” MTD Solution: Zimperium Federal Cloud

Speaker: JT Keating (Zimperium's Vice President of Product Strategy) and Tim Pero (Zimperium's Director of Customer Success for Public Sector)
Watch Recording

RFP Section #5: Deployment Technology & Workflow Integrations

RFP Section #5: Deployment Technology & Workflow Integrations

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

RFP Section #4: Security Technology & Workflow Integrations

RFP Section #4: Security Technology & Workflow Integrations

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

Treat Your Mobile App Like You Treat Your Teenager

Treat Your Mobile App Like You Treat Your Teenager

Speaker: Scott King, Zimperium's Director of Embedded Security
Watch Recording

RFP Section #3: Mobile Technology & Workflow Integrations

RFP Section #3: Mobile Technology & Workflow Integrations

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

RFP Section #2: In-Depth Risk Analysis

RFP Section #2: In-Depth Risk Analysis

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

RFP Section #1: Advanced, Purpose-Built Threat Detection

RFP Section #1: Advanced, Purpose-Built Threat Detection

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

CCPA Compliance for Mobile Devices

CCPA Compliance for Mobile Devices

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

Banks Admit Cybersecurity is the Biggest Threat. Now What?

Banks Admit Cybersecurity is the Biggest Threat. Now What?

Speaker: Scott King, Zimperium's Director of Embedded Security
Watch Recording

NERC Compliance for Mobile Devices

NERC Compliance for Mobile Devices

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

NDB Compliance for Mobile Devices

NDB Compliance for Mobile Devices

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

GDPR Compliance for Mobile Devices

GDPR Compliance for Mobile Devices

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

HIPAA Compliance for Mobile Devices

HIPAA Compliance for Mobile Devices

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

PCI Compliance for Mobile Devices

PCI Compliance for Mobile Devices

Speaker: JT Keating, Zimperium's Vice President of Product Strategy
Watch Recording

The Mobile Security Deadly Sin of Opening an Entry Point to the Corporate Network

The Mobile Security Deadly Sin of Opening an Entry Point to the Corporate Network

Speaker: JT Keating (Vice President of Product Strategy, Zimperium)
Watch Recording

PSD2 Compliance for Mobile Devices

PSD2 Compliance for Mobile Devices

Speaker: Scott King, Zimperium's Director of Embedded Security
Watch Recording

The Mobile Security Deadly Sin of Allowing Mobile to Deliver Ransomware

The Mobile Security Deadly Sin of Allowing Mobile to Deliver Ransomware

Speaker: JT Keating (Vice President of Product Strategy, Zimperium)
Watch Recording

The Mobile Security Deadly Sin of Exposing Passwords and/or Login Info

The Mobile Security Deadly Sin of Exposing Passwords and/or Login Info

Speaker: JT Keating (Vice President of Product Strategy, Zimperium)
Watch Recording

The Mobile Security Deadly Sin of Letting Hackers Turn on Microphones and/or Cameras

The Mobile Security Deadly Sin of Letting Hackers Turn on Microphones and/or Cameras

Speaker: JT Keating (Vice President of Product Strategy, Zimperium)
Watch Recording

The Mobile Security Deadly Sin of Not Protecting Corporate Apps

The Mobile Security Deadly Sin of Not Protecting Corporate Apps

Speaker: JT Keating (Vice President of Product Strategy, Zimperium)
Watch Recording

The Mobile Security Deadly Sin of Not Securing Corporate Email

The Mobile Security Deadly Sin of Not Securing Corporate Email

Speaker: JT Keating (Vice President of Product Strategy, Zimperium)
Watch Recording

Why You Need to CYA... Cover Your Apps!

Why You Need to CYA... Cover Your Apps!

Speakers: Chris Dworkin (GM, In-App Security) and Rajeev Gupta (SVP, Product Development)
Watch Recording

Enterprise Phishing Attacks and the Need to Defend Mobile Endpoints

Enterprise Phishing Attacks and the Need to Defend Mobile Endpoints

Speakers: JT Keating (Vice President of Product Strategy, Zimperium) and Simon Gibson (Analyst, GigaOm Research)
Watch Recording

Mobile Ransomware Can Make You WannaCry

Mobile Ransomware Can Make You WannaCry

Speaker: Kern Smith, Director of Enterprise Sales Engineering
Watch Recording

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Speaker: JT Keating (Vice President of Product Strategy)
Watch Recording

That Was Close! Tales of Near-Miss Mobile Attacks

That Was Close! Tales of Near-Miss Mobile Attacks

Speaker: JT Keating (Vice President of Product Strategy)
Watch Recording

Protecting Mobile Shopping Apps From... Consumers’ Phones!

Protecting Mobile Shopping Apps From... Consumers’ Phones!

Speakers: Chris Dworkin (GM, In-App Security) and JT Keating (Vice President of Product Strategy)
Watch Recording

Top Mobile App Security Threats

Top Mobile App Security Threats

Speakers: Chris Dworkin (GM, In-App Security) and JT Keating (Vice President of Product Strategy)
Watch Recording

An In-Depth Look at the NYC Secure App

An In-Depth Look at the NYC Secure App

Speakers: Michael Callahan (CMO) and Chul Yim (Head of State, Local & Education)
Watch Recording

Protecting Your Customers from BankBot

Protecting Your Customers from BankBot

Speakers: Chris Dworkin (GM, In-App Security) and JT Keating (Vice President of Product Strategy)
Watch Recording

Top 5 Things to Know About Mobile Security

Top 5 Things to Know About Mobile Security

Speaker: JT Keating (Vice President of Product Strategy)
Watch Recording

mHealth’s Responsibility for Patients’ Digital Lives

mHealth’s Responsibility for Patients’ Digital Lives

Speakers: Chris Dworkin (GM, In-App Security) and JT Keating (Vice President of Product Strategy)
Watch Recording

Top Mobile Security Predictions for 2019

Top Mobile Security Predictions for 2019

Speaker: JT Keating (Vice President of Product Strategy)
Watch Recording

How to Deliver Secure Mission Critical Mobile Apps with Zimperium and 3rd Eye Technologies

How to Deliver Secure Mission Critical Mobile Apps with Zimperium and 3rd Eye Technologies

Speakers: JT Keating (Zimperium's Vice President of Product Strategy); Chris Dworkin (Zimperium's GM of mobile application security) and Ron Huda (3rd Eye Technologies' CEO)
Watch Recording

Top Mobile Security Surprises of 2018

Top Mobile Security Surprises of 2018

Speaker: JT Keating (Vice President of Product Strategy)
Watch Recording

Protecting Finance Mobile Apps Against Hackers & Reducing Fraud

Protecting Finance Mobile Apps Against Hackers & Reducing Fraud

Speakers: Chris Dworkin (GM, In-App Security) and JT Keating (Vice President of Product Strategy)
Watch Recording

2018 Report: Enterprise Mobile Device Attacks and Threats

2018 Report: Enterprise Mobile Device Attacks and Threats

Speakers: JT Keating (Vice President of Product Strategy) and Scott King (Director of Customer Advocacy)
Watch Recording

zIAP Introduction: Enterprise Grade Mobile App Security in Less Than 10 Minutes

zIAP Introduction: Enterprise Grade Mobile App Security in Less Than 10 Minutes

Speakers: Chris Dworkin (GM, In-App Security) and JT Keating (Vice President of Product Strategy)
Watch Recording

Real World Examples: Mobile Threats Detected at a Hospital

Real World Examples: Mobile Threats Detected at a Hospital

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

Can a Corporate Network Get Hacked Via a Smartphone? Hint: Yes! Here’s How It Happened

Can a Corporate Network Get Hacked Via a Smartphone? Hint: Yes! Here’s How It Happened

Speakers: Andrea Pierini (Penetration Tester) and JT Keating, Vice President of Product Strategy
Watch Recording

Real World Examples: Mobile Threats Detected at Law Firms

Real World Examples: Mobile Threats Detected at Law Firms

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

The Mobile Menace Most Wanted List: #1 OS Exploits

The Mobile Menace Most Wanted List: #1 OS Exploits

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

The Mobile Menace Most Wanted List: #2 Rogue Profile

The Mobile Menace Most Wanted List: #2 Rogue Profile

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

The Mobile Menace Most Wanted List: #3 Phishing

The Mobile Menace Most Wanted List: #3 Phishing

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

The Mobile Menace Most Wanted List: #4 Bad WiFi

The Mobile Menace Most Wanted List: #4 Bad WiFi

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

The Mobile Menace Most Wanted List: #5 MITM

The Mobile Menace Most Wanted List: #5 MITM

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

The Mobile Menace Most Wanted List: #6 Malicious App

The Mobile Menace Most Wanted List: #6 Malicious App

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

The Mobile Menace Most Wanted List: #7 Risky App

The Mobile Menace Most Wanted List: #7 Risky App

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

How to Protect Billions Against Mobile Banking Fraud

How to Protect Billions Against Mobile Banking Fraud

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

The State of Mobile Device Threats: 2018 H1 Mobile Threat Report

The State of Mobile Device Threats: 2018 H1 Mobile Threat Report

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

Here phishy, phishy, phishy!

Here phishy, phishy, phishy!

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

Addressing the Emerging Mobile Cybersecurity Threats Facing State and Local Governments

Addressing the Emerging Mobile Cybersecurity Threats Facing State and Local Governments

Speakers: Karen Jackson, Former Secretary of Technology for the Commonwealth of VA and Chul Yim, Zimperium's Director of State & Local Government Accounts
Watch Recording

Mobile Security: Rise of the Machine (Learning)

Mobile Security: Rise of the Machine (Learning)

Speaker: John Michelsen, Chief Technology Officer
Watch Recording

Zimperium’s EMM integration with BlackBerry

May is EMM Month | Zimperium & BlackBerry

Speakers: JT Keating, Vice President of Product Strategy and Matt Gueiros, Principal Technical Solutions Manager at BlackBerry
Watch Recording

Zimperium’s EMM integration with MobileIron 

May is EMM Month | Zimperium & MobileIron

Speakers: JT Keating, Vice President of Product Strategy; Kern Smith, Director of Sales Engineering and Chris Dobrec, VP of Marketing at MobileIron
Watch Recording

Zimperium’s EMM integration with Citrix XenMobile

May is EMM Month | Zimperium & Citrix XenMobile

Speakers: JT Keating, Vice President of Product Strategy and Jon Blackman, Director of Presales Engineering
Watch Recording

Zimperium’s EMM integration with VMware Workspace ONE powered by AirWatch

May is EMM Month | Zimperium & VMware AirWatch

Speakers: JT Keating, Vice President of Product Strategy and Jon Blackman, Director of Presales Engineering
Watch Recording

Zimperium’s EMM integration with Intune

May is EMM Month | Zimperium & Microsoft Intune

Speakers: JT Keating, Vice President of Product Strategy and Jon Blackman, Director of Presales Engineering
Watch Recording

2018 Enterprise Mobile Device Attacks and Threats

You're Not Seeing Mobile Attacks & You Never Will Unless You Make This Change

Speakers: JT Keating, Vice President of Product Strategy and John Michelsen, Chief Technology Officer
Watch Recording

NIS Directive: Meeting NCSC’s Mobile Security Guidance

NIS Directive: Meeting NCSC’s Mobile Security Guidance

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

Enterprise Mobile Threat Defense Platform Zimperium 5.0

Enterprise Mobile Threat Defense Platform Zimperium 5.0

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

Compliance and Mobile Devices: The Forgotten Endpoint

Compliance and Mobile Devices: The Forgotten Endpoint

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

2018 Enterprise Mobile Device Attacks and Threats

2018 Report: Enterprise Mobile Device Attacks and Threats

Speakers: JT Keating, Vice President of Product Strategy and Scott King, Director of Customer Advocacy
Watch Recording

Protect Your Customers from BankBot

Protect Your Customers from BankBot

Speaker: JT Keating, Vice President of Product Strategy
Watch Recording

How to Calculate Risk of Your Mobile Endpoints

How to Calculate Risk of Your Mobile Endpoints

Speakers: John Michelsen, Chief Product Officer and Phil Hochmuth, Program Director, IDC’s Enterprise Mobility
On Demand

Mobile Devices are Endpoints Too

Mobile Devices are Endpoints Too

Speakers: John Michelsen, Chief Product Officer and Andrew Kellett, Principal Analyst, Ovum
On Demand

How to Balance Mobility, Security and Privacy

How to Balance Mobility, Security and Privacy

Speakers: John Michelsen, Chief Product Officer and Chris Marsh, Research Director, 451 Research
On Demand

Enter the Mind of the Mobile Hacker Presented by MobileIron and Zimperium

Enter the Mind of the Mobile Hacker Presented by MobileIron and Zimperium

Speakers: Jon Paterson, VP Sales Engineering and Mike Raggo, Director Security Research, MobileIron
On Demand

Enhance Mobility Management with Cyber Protection Presented by AirWatch and Zimperium

Enhance Mobility Management with Cyber Protection Presented by AirWatch and Zimperium

Speakers: Jon Paterson, VP Sales Engineering and Brian Katz, Director of Mobile Strategy, VMware
On Demand

Modern Mobile Threats Presented by Enterprise Mobile and Zimperium

Modern Mobile Threats Featuring Enterprise Mobile

Speakers: John Michelsen, CPO and Amanda Butlett, Mobility Services Director, Enterprise Mobile
On Demand

Modern Mobile Threats Zimperium Webinar featuring Gartner

Modern Mobile Threats Featuring Gartner

Speakers: John Michelsen, CPO and Patrick Hevesi, Research Director, Gartner
On Demand

Does Your BYOD Policy Allow Bad Apps?

Does Your BYOD Policy Allow Bad Apps?

Speaker: John Michelsen, CPO
On Demand

The Biggest Threat To Enterprises Comes on the Smallest Screen

The Biggest Threat to Enterprises Comes on the Smallest Screen

Speakers: Zuk Avraham, Founder, CTO and Patrick Murray, VP Products
On Demand