Most organizations now realize that mobile devices are an unprotected endpoint with access to, or containing all of the information of a traditional endpoint. And while there are some overlaps in what you protect, the way you solve the traditional endpoint security problem is completely different than how you solve the mobile security problem.
The chief information security officer (CISO), responsible for an organization's information and data security, has the unenviable challenge of maintaining control in a BYOD culture.
In order to help organizations of all sizes proactively protect employees and data from mobile threats, Zimperium is hosting a series of webinars focusing on seven of the problem areas, or deadly sins, CISOs must address. In this webinar, we discuss the deadly sin of letting hackers turn on microphones/cameras.
Join us to learn about:
- Examples of how hackers can leverage an executive’s location, calendar and contacts
- How protecting location, calendar, and contacts differs on desktop vs mobile
- What can be done to prevent hackers from accessing executives’ location, calendar and contacts
**Note: If registering on a mobile device, Recaptcha will open a window at the top of the page. Scroll to the top of the page and select the defined criteria to complete registration.