Posted on
in Presentations
Mobile technology is more than ubiquitous, with some of the most-important business leaders having access to the most sensitive data whenever and wherever they want through their smartphone. Learn how an organization suffered a tremendous loss of data due to mobile vulnerabilities and how the attackers pivoted from mobile to the core of the enterprise’s data stores and Office 365 services.
Learning Objectives:
1: Understand how to evaluate mobile vulnerabilities.
2: Learn how to prioritize mobile security tools and policies.
3: Understand how to coordinate Office365 and InTune logs with mobile device vulnerabilities.
Pre-Requisites:
Knowledge of mobile operating system fundamentals, mobile device management capabilities.
Learning Objectives:
1: Understand how to evaluate mobile vulnerabilities.
2: Learn how to prioritize mobile security tools and policies.
3: Understand how to coordinate Office365 and InTune logs with mobile device vulnerabilities.
Pre-Requisites:
Knowledge of mobile operating system fundamentals, mobile device management capabilities.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community