Star 0

Abstract

Most organizations lack a defense-in-depth strategy to address the evolving mobile threat landscape. Their app vetting is inadequate; their mobile incident response lifecycle is immature; and they overestimate traditional threats while underestimating new threats. This session dives into the hacker’s mind to establish best practices for securing corporate mobile data.