Fraud and Data Exfiltration: Defending Against the Mobile Explosion
Mobile devices offer numerous opportunities for wrongdoers to commit fraud or steal data. What are the risks of targeted mobile service fraud, who are the players, and what can organizations do about it based upon the law? What monitoring technologies exist and how can those technologies be used legally by enterprises for monitoring cellular communications? This session will cover these and other troubling mobile device issues.