Watch the on-demand, protect sensitive mobile communications
Smartphones are increasingly used to access classified and sensitive government data but they’re also becoming one of the most exploited attack surfaces. Are your mobile communications truly secure?
In this expert-led webinar, you’ll discover how government organizations and high-security sectors can protect their data from evolving mobile threats.
Now available on-demand, watch anytime:

Why this webinar matters
In recent years, government agencies across Europe have experienced incidents caused by unsecured mobile devices from leaked sestitive data to compromised operations.
This webinar delivers:
- Real-world examples of mobile attacks on government targets
- A practical framework for improving mobile security maturity
- Strategic approaches to secure communication in high-risk environments
- Insights tailored for public sector decision-makers
Webinar details
- Webinar: Protect Sensitive Information on Smartphones
- Originally aired: May 22
- Duration: 45 minutes
- Format: Online, on-demand
Who should watch?
This session is specifically designed for professionals working with classified or sensitive data in:
- Ministries and government agencies
- Defense and intelligence services
- Police, justice, and emergency operations
- Public sector IT, risk & compliance teams
- National and local authorities
Expert speakers
Umit Aksu
Director, Mobile Hacking Lab
International expert in mobile threat analysis. Umit shares live cases and current threat trends impacting government devices.
Samuel Gustafsson
Head of International Affairs, Tutus (part of CR Group)
Advisor to EU and NATO entities on secure mobile infrastructure. Samuel presents five scalable approaches to secure mobile systems.
Jurjen Braakhekke
Product Manager, Fox Crypto
Developer of the Secure Mobile Maturity Model. Jurjen offers a hands-on framework to assess and improve your mobile readiness.
What you’ll learn
- Where current mobile risks lie and why many are still overlooked
- How to structure your organization’s mobile security approach
- Why certain infrastructures fail under pressure and how to avoid it
- Tools, tactics and frameworks to secure mobile communications in government environments
Watch now: on-demand webinar
Whether you’re defining policy, managing IT, or protecting critical operations: mobile security must be a priority.
Don’t wait for a breach. Watch the webinar now and take the next step toward mobile security.