Ulterior.live

Your employees rely heavily on mobile devices for the authentication, communication, and productivity from anywhere, but are those devices protected?

Social engineering-based attacks on smartphones and tablets increased by 20% in the second half of 2024 – proving that threat actors see them as a critical step in their end goal to access your data.
 
Join our group of peers for this invite-only, private Digital Think Tank, to learn, share ideas, discuss challenges, discover solutions and walk away with actionable insights.

Discussion

Topics

How do you know what types of social engineering attacks are your employees exposed to?

What strategies do you have in place to prevent social engineering attacks?

How does your security team integrate visibility into risks and threats coming in via mobile with the rest of their endpoint security strategy?

If an attacker gets in pretending to be one of your employees, what are you most concerned they would do first to your IT organization?

Let’s discuss how you view employees using personal devices for work.

SUBJECT MATTER EXPERT

Tom Davison

Speaker 1

Senior Director of Sales Engineering EMEA & APAC at Lookout

Lookout

Tom Davison leads the EMEA solutions engineering team at Lookout, working with organisations at all levels to define, implement and derive value from mobile and cloud security solutions. Tom maintains a focus on the mobile threat landscape and frequently shares insights on the latest pertinent threats, evolving tactics, and how to stay ahead in protecting a remote and mobile workforce.

ABOUT

Lookout

Lookout, Inc. is the data-centric cloud security company that uses a defense in-depth strategy to address the different stages of a modern cybersecurity attack. Data is at the core of every organization, and our approach to cybersecurity is designed to protect that data within today’s evolving threat landscape no matter where or how it moves. People — and human behavior — are central to the challenge of protecting data, which is why organizations need total visibility into threats in real time. The Lookout Cloud Security Platform is purpose-built to stop modern breaches as swiftly as they unfold, from the first phishing text to the final cloud data extraction. We are trusted by enterprises and government agencies of all sizes to protect the sensitive data they care about most, enabling them to work and connect freely and securely. To learn more, visit www.lookout.com and follow Lookout on our blog, LinkedIn and X.