To view this email as a web page, click here

Today: Aug. 28th at 2:00 PM EDT

Attendees of this live webcast may be eligible for CPE credit.

Mobile apps have become indispensable tools, but they also pose significant security threats. You’d be surprised how many millions of downloads some risky apps have, exposing users and organizations to exploitable vulnerabilities. These risks range from collecting data well beyond what is necessary to leaking Personally Identifiable Information (PII) and everything in between.

Don't miss our Panelcast today, Wednesday, Aug. 28th at 2pm ET as the experts discuss how to identify threats, protect data and fortify mobile security by exploring the following 8 types of risky mobile apps, including the attack processes and advantages for bad actors:

  • Overprivileged
  • Harvester
  • Colluding
  • Shifty
  • Sloppy
  • Leaky
  • Chatty
  • Sticky
 
 
REGISTER NOW
 
 
MEET THE EXPERTS
Nikos Kiourtis
Chief Technology Officer
Quokka
Vijay Pawar
SVP of Product
Quokka
Joshua Copeland
Quadrant Information Security
Mike Shema
Tech Lead
Block
 
 
..