10/22/2015

Zix’s Hacker Series Continues: David Kennedy on Mobile Devices

by ZixCorp

Posts

Regular readers may remember this blog referring to the ease with which hackers can intercept emails being transmitted over unprotected fiber optic cables. I’m now pleased to share with you that David Kennedy, the renowned security expert, has agreed to be interviewed during a live Webinar scheduled for November 11th at 2 p.m. ET. During the interview, I will ask David for his views on the current security levels of mobile devices such as smartphones and tablets. Just how easy is it to compromise mobile devices remotely, or while in the physical possession of hackers? Can operating systems such as iOS and Android resist the current crop of jailbreaking and rooting toolkits? Are Mobile Device Management (MDM), or containerized solutions protected by the remote wipe instruction? David KennedyDavid founded or co-founded several security companies and is one of the originators of the Penetration Testing Execution Standard (PTES), the industry standard for the execution of penetration tests. He’s been a guest on Fox News and CNN, and is a regular speaker at security conferences. Plus he’s the co-author of a best-selling book on penetration testing. It is apt that I will interview David on Veteran’s Day, both of us having served in the military, and I shall hope to have a private chat about his service in the Intelligence Department of the U.S. Marine Corps. However, while we’re live “on-air” I’ll be asking David to describe for us why securing mobility devices – particularly BYOD devices – is so complex, and why securing them is critical for protecting corporate networks and corporate data. While listeners will be able to send in their questions during the webcast, priority will be given to questions submitted in advance. To do this, please tweet your questions to @ZixCorp, comment on our LinkedIn page, or just type your questions into the comments area further down this page. Please register to join David Kennedy and me on November 11th using this link: http://go.zixcorp.com/20151111_Webinar_DavidKennedy.html

Posted: 10/22/2015 12:00:00 AM by Global Administrator | with 0 comments
Filed under: BYOD, device, hacker, mobile, security, series, Webinar


Recent Posts

11/21/2017

The Best Defense is Good Offense When Protecting Your Inboxes

View Blog Post

11/14/2017

How to Spot BEC Attacks and Best Limit Their Success

by Guest Blogger Michael Osterman

View Blog Post

11/01/2017

Why Google’s Transparency Report Reveals Only the First Step Toward Email Security

by Geoff Bibby

View Blog Post