Download Webinar
Thank You!
We're committed to your privacy. Lookout uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.
Mobile Devices Are Leaving the Door Open to Cyberattackers
Your employees are using personal mobile devices (iOS, Android and Chromebooks) for work and corporate mobile devices for personal use - an attack on a mobile device is an attack on your corporate data.
Lisa Forte, Social Engineering & Cyber Security Expert and Hank Schless, Sr. Manager of Security Solutions at Lookout and host of the Endpoint Enigma podcast will discuss:
- The psychology behind why social engineering and mobile phishing are so successful
- Why phishing email training is not being transferred to mobile devices
- Examples of serious cyber crimes Lisa has encountered
- A live demonstration of a phishing attack happening
Featured Speaker:
Lisa Forte began her career in counter-terrorism intelligence for a UK Government agency before moving into one of the UK Police Cyber-Crime Units dealing with serious cybercrime cases. Through these experiences she has gained a unique insight into the darker side of human nature and has led to her becoming one of the leading experts on cybercrime cases involving social engineering and psychological manipulation.
Host:
Speakers:
You may also be interested in:
CASB Buyer’s Guide
CASBs deliver cloud-specific security capabilities that traditional perimeter-focused products can’t. IT leaders need to understand what they are getting with a CASB product.
Strengthening Cloud Security With SASE
Learn how to roll out a SASE deployment at scale while taking into account current security practices, trends, and pertinent questions that every security leader needs to ask.
SASE Strategy Guidebook
If you are looking to build your SASE Strategy for your entire organization’s using true cloud security protection, then you don't want to miss these handpicked insights.
Top Five Risks When Operating in the Cloud
Now that you’re operating in the cloud you need to be aware of the data security risks and take the appropriate steps to mitigate them.
Excellent Add-On For Cloud Storage
Excellent company to work with, this product enabled wider cloud storage adoption for us by providing an option to encrypt data with separate keys.
Security and Risk Management
50M - 250M USD
Amazing CASB to Help With Data Security and DLP Integration
Lookout CASB is a great product. Out of all the products reviewed, it was the only product that allowed the data to be secured, regardless of location of endpoint or the data itself, as the security follows the data.
Security and Risk Management
Gov't/PS/ED 5,000 - 50,000 Employees
Easy and Effective Lookout Deployment
We deployed Lookout on a very small group of users, all company devices. Administration of policies and deployment is effortless compared to other products, and the footprint on devices is very small... Overall a very good experience.
Infrastructure and Operations
<50M USD