Download pdf

The first decade of widespread use of smartphones and mobile operating systems saw a constant evolution of the attack landscape. Using a decade of data around mobile threats and vulnerabilities, the presenters will show the trends and principles that will drive the direction of the future of risk management, particularly as mobile platforms increasingly operate outside traditional perimeters.