Download Webinar

Thank You!

Register Now

We're committed to your privacy. Lookout uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Mobile Devices Are Leaving the Door Open to Cyberattackers

Your employees are using personal mobile devices (iOS, Android and Chromebooks) for work and corporate mobile devices for personal use - an attack on a mobile device is an attack on your corporate data.

Lisa Forte, Social Engineering & Cyber Security Expert and Hank Schless, Sr. Manager of Security Solutions at Lookout and host of the Endpoint Enigma podcast will discuss:

  • The psychology behind why social engineering and mobile phishing are so successful
  • Why phishing email training is not being transferred to mobile devices
  • Examples of serious cyber crimes Lisa has encountered
  • A live demonstration of a phishing attack happening

Featured Speaker:

Lisa Forte began her career in counter-terrorism intelligence for a UK Government agency before moving into one of the UK Police Cyber-Crime Units dealing with serious cybercrime cases. Through these experiences she has gained a unique insight into the darker side of human nature and has led to her becoming one of the leading experts on cybercrime cases involving social engineering and psychological manipulation.

Speakers:

Lisa Forte
Social Engineering & Cyber Security Expert
Hank Schless
Director of Global Security Campaigns

You may also be interested in:

2023 Gartner® Critical Capabilities Security Service Edge (SSE)

Lookout scored among the highest three vendors in all Use Cases in the 2023 Gartner® Critical Capabilities Security Service Edge (SSE).

The State of Remote Work Security 2023

Organizations need a new approach to security so that they can keep pace with the way remote users access data and collaborate with each other.

Standalone Tools Create Complexity: Why You Need to Simplify Security

Read this e-book to learn how to streamline your security operations by implementing an integrated, platform-centric security solution.

Consolidating IT Security? Here’s Why You Need a Data-Centric Platform

Read this e-book to learn why Lookout’s endpoint-to-cloud approach is uniquely positioned to reduce the complexity of your IT security.

Excellent Add-On For Cloud Storage

Excellent company to work with, this product enabled wider cloud storage adoption for us by providing an option to encrypt data with separate keys.

Security and Risk Management

50M - 250M USD

Amazing CASB to Help With Data Security and DLP Integration

Lookout CASB is a great product. Out of all the products reviewed, it was the only product that allowed the data to be secured, regardless of location of endpoint or the data itself, as the security follows the data.

Security and Risk Management

Gov't/PS/ED 5,000 - 50,000 Employees

Easy and Effective Lookout Deployment

We deployed Lookout on a very small group of users, all company devices. Administration of policies and deployment is effortless compared to other products, and the footprint on devices is very small... Overall a very good experience.

Infrastructure and Operations

<50M USD

Businesses, governments, and millions of individuals around the world have trusted Lookout to safeguard their data.
100
Businesses worldwide
200m
Individuals' personal data
205m+
Mobile devices
170m
Mobile apps
16.5k
SaaS apps
100
Threat families
NTT Docomo Logo
Verizon Logo
AT&T Logo
Telefónica Logo
Google Logo
VMWare Logo