Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

header desktop lookout
Congress@it-sa Lecture programme

Securing the Digital Frontier: Defend, Protect, Thrive

Gain skills and insights on Mobile Phishing, Data Protection in the Cloud, optimize security strategies, and stay ahead of evolving threats!

calendar_today Tue, 10.10.2023, 14:30 - 17:30

event_available On site

place Room Krakau, NCC Ost

Action description

south_east

Speaker

south_east

Themes

Awareness / Phishing / Fraud Cloud Security Data security / DLP / Know-how protection Endpoint Protection Mobile Security SIEM / Threat Analytics / SOC Websecurity / VPN

Key Facts

  • Minimize the risk of mobile compromise
  • Effectively secure data in the cloud
  • Prevent breaches with Mobile EDR

Organizer

Event

This action is part of the event Congress@it-sa

Action description

Register here and secure your spot for the workshop series. Seats are limited: https://bit.ly/43viEUb

At a time when mobile devices and cloud services are an integral part of our daily lives, it is imperative that we equip ourselves with the knowledge and tools to protect against emerging threats.

Join your choice of Lookout workshops to develop insights and skills on optimizing your response to mobile phishing attacks, identifying and mitigating risks to data in the cloud, and threat hunting on mobile devices.

14.30 - 15.30 pm: Optimize Your Response to Mobile Phishing Attacks

Mobile phishing is on the rise and playing a significant role in enabling data breaches. In this session, you will learn and have the opportunity to participate in a safely managed mobile phishing campaign. You will explore how Mobile Threat Defense (MTD) approaches can be leveraged to minimize the risk of compromising mobile users.

15.30 - 16.30 pm: Data Protection and Cloud - Identifying and Mitigating Risks

Whilst cloud applications have brought tremendous benefits, they also brought new security challenges. By enabling users anywhere access to corporate resources you lose the visibility and control that perimeter-based tools provide. This workshop is designed to help you navigate the complex landscape of data protection in the cloud. Experts will walk you through best practices for securing sensitive data, implementing robust encryption methods, and managing access controls. You'll gain insight into the potential risks associated with cloud services and learn effective mitigation strategies to protect what’s most important to your organization…data.

16.30 - 17.30 pm: Threat Hunting Using Mobile EDR

Many successful attacks start with the compromise of a mobile device, stealing digital identity credentials. In this workshop, we will show you how to threat hunt using Mobile Endpoint Detection and Response (EDR). You will learn how to identify early attack indicators and effectively prevent threat actors from advancing toward a successful breach.

These workshops are designed for anyone responsible for securing enterprise IT infrastructures and enhancing their organization's security posture. Don't miss this opportunity to fortify your security knowledge skills to help you safeguard your organization’s digital future. Register now!
... read more

Participation Limit: 55

Language: German

Questions and Answers: Yes

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.