How to protect sensitive information on smartphones? Register for the webinar on May 22!

Webinar: Security of Smartphones

Protect sensitive information on smartphones

More and more organizations are facing security incidents due to the unsafe use of smartphones. Ensure your organization is prepared to tackle mobile threats today. Want to learn how? Sign up for our webinar and gain insights from experts on keeping your mobile communications secure.

Date: May 22
Time: 1:00 PM – 2:00 PM
Location: Online

What to expect?

During this interactive webinar, we will guide you through the key challenges and solutions in Secure Mobile. Learn how to protect your organization from smartphone-targeted threats and gain insight into effective methods and solutions for building secure smartphone systems.

Program

1:00 PM – 1:15 PM | Umit Aksu (Director, Mobile Hacking Lab)
Examples of unknown smartphone risks
Discover the latest trends in smartphone threats, with real-world incident examples.

1:15 PM – 1:30 PM | Jurjen Braakhekke (Product Manager, Fox Crypto)
The Fox Crypto approach: Secure Mobile Maturity Model
How mature is your organization in terms of mobile security? Jurjen will discuss the Maturity Model Fox Crypto’s approach for continuously enhancing mobile security.

1:30 PM – 1:45 PM | Samuel Gustafsson (Head of International Affairs, Tutus – part of CR Group)
Five different philosophies or approaches to building secure smartphone stacks, each with increasing levels of security, independence from third-party dependencies, and control over the device’s software and hardware stack.

1:45 PM – 1:50 PM | Q&A

Who is it for?

This webinar is valuable for professionals working with sensitive information or looking to protect their intellectual property, including:

  • IT Managers, Security Experts, and Policymakers – working in organizations handling sensitive and classified information. Including:
  • Central Government, Defense, Ministries, Police, Emergency Services, and organizations handling sensitive or classified information.
  • Multinational Corporations – organizations dealing with intellectual property, vital, or confidential information.

Speakers

Umit Aksu, Director, Mobile Hacking Lab
A specialist in mobile threats, Umit shares the latest trends in mobile security and the risks organizations face.

Jurjen Braakhekke, Product Manager, Fox Crypto
An expert in secure mobile solutions, Jurjen discusses the Maturity Model and provides practical solutions for secure mobile communication.

Samuel Gustafsson, Head of International Affairs, Tutus a part of CR Group
An experienced leader in business leadership, security solutions, and public-private partnerships, his recent focus has been on enabling secure nationwide networks and intelligence services for EU/NATO organizations.

Practical information

Date: May 22
Time: 1:00 PM – 2:00 PM
Location: Online (link will be sent upon registration)

Registration is free – don’t miss out!