Mobile apps have become indispensable tools, but they also pose significant security threats. You’d be surprised how many millions of downloads some risky apps have, exposing users and organizations to exploitable vulnerabilities. These risks range from collecting data well beyond what is necessary to leaking Personally Identifiable Information (PII) and everything in between.
This panel webcast will help security practitioners identify such threats, protect data and fortify mobile security by exploring the following 8 types of risky mobile apps, including the attack processes and advantages for bad actors:
Nikos Kiourtis is the Chief Technology Officer at Quokka, leading the company’s engineering and research & development teams. Prior to Quokka, he was a Research Assistant Professor at George Mason University and a Guest Researcher at NIST. Nikos holds a Degree in Mathematics, a MSc in Theoretical Computer Science, and a PhD in Computer Science.
Vijay has been with Quokka for over a year and currently serves as the SVP of Product. Vijay has over 20 years of experience in security and enterprise software driving innovation and technology disruption. He brings expertise in Identity & Access Management (IAM), Unified Endpoint Management (UEM) and Mobile Security.
Joshua Copeland is a battle-tested cybersecurity expert with a wealth of experience in the field, currently serving as the Director of Managed Security Services at Quadrant Security. He is a 20-year veteran of the Air Force and has served in leadership roles with Bose, AT&T, and GDIT, focusing on security operations, governance, and the cloud. He is a sought-after guest speaker at prestigious conferences such as BlackHat, BSides, and RSAC, and his expertise makes him a highly coveted guest for podcasts and webinars. Joshua is also a member of the adjunct faculty at Tulane University, teaching cybersecurity and leadership.
Mike Shema is a Tech Lead at Block.