August
28
2:00 PM ET

8 ways attackers target mobile apps to steal your data (and how to stop them)

Live Webcast|1 hour

Mobile apps have become indispensable tools, but they also pose significant security threats. You’d be surprised how many millions of downloads some risky apps have, exposing users and organizations to exploitable vulnerabilities. These risks range from collecting data well beyond what is necessary  to leaking Personally Identifiable Information (PII) and everything in between. 

This panel webcast will help security practitioners identify such threats, protect data and fortify mobile security by exploring the following 8 types of risky mobile apps, including the attack processes and advantages for bad actors:

  • Overprivileged
  • Harvester 
  • Colluding
  • Shifty
  • Sloppy
  • Leaky
  • Chatty
  • Sticky

Speakers

Nikos Kiourtis
CTO
Quokka

Nikos Kiourtis is Quokka’s CTO and have been with the company for over 7 years. Nikos has a Ptyxion Degree in Mathematics, a MSc in Theoretical Computer Science, and a PhD in Database Theory. Nikos joined Quokka after working alongside Angelos Stavrou, a Quokka co-founder, at George Mason University.

Vijay Pawar
SVP of Product
Quokka

Vijay has been with Quokka for over a year and currently serves as the SVP of Product. Vijay has over 20 years of experience in security and enterprise software driving innovation and technology disruption. He brings expertise in Identity & Access Management (IAM), Unified Endpoint Management (UEM) and Mobile Security.

Mike Shema
Tech Lead
Block

Mike Shema is a Tech Lead at Block.

Sponsors

Quokka
0%