Mobile Security and the Post-Perimeter World: 10 Years of Mobile Threats

  1. Moscone South

The first decade of widespread use of smartphones and mobile operating systems saw a constant evolution of the attack landscape. Using a decade of data around mobile threats and vulnerabilities, the presenters will show the trends and principles that will drive the direction of the future of risk management, particularly as mobile platforms increasingly operate outside traditional perimeters.

Download pdf
Participants: