Anatomy of an Enterprise Mobile Security Incident (Repeat)

Posted on in Presentations

Mobile technology is more than ubiquitous, with some of the most-important business leaders having access to the most sensitive data whenever and wherever they want through their smartphone. Learn how an organization suffered a tremendous loss of data due to mobile vulnerabilities and how the attackers pivoted from mobile to the core of the enterprise’s data stores and Office 365 services.

Learning Objectives:
1: Understand how to evaluate mobile vulnerabilities.
2: Learn how to prioritize mobile security tools and policies.
3: Understand how to coordinate Office365 and InTune logs with mobile device vulnerabilities.

Knowledge of mobile operating system fundamentals, mobile device management capabilities.
Aaron Turner


Saas CTO, Vectra AI

Share With Your Community