Download Free Resource

Thank you for your interest!

We're committed to your privacy. Lookout uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.

Mobile Devices Are Leaving the Door Open to Cyberattackers

Woman using mobile phone and laptop in an open plan office.

Your employees are using personal mobile devices (iOS, Android and Chromebooks) for work and corporate mobile devices for personal use - an attack on a mobile device is an attack on your corporate data.

Lisa Forte, Social Engineering & Cyber Security Expert and Hank Schless, Sr. Manager of Security Solutions at Lookout and host of the Endpoint Enigma podcast will discuss:

  • The psychology behind why social engineering and mobile phishing are so successful
  • Why phishing email training is not being transferred to mobile devices
  • Examples of serious cyber crimes Lisa has encountered
  • A live demonstration of a phishing attack happening

Featured Speaker:

Lisa Forte began her career in counter-terrorism intelligence for a UK Government agency before moving into one of the UK Police Cyber-Crime Units dealing with serious cybercrime cases. Through these experiences she has gained a unique insight into the darker side of human nature and has led to her becoming one of the leading experts on cybercrime cases involving social engineering and psychological manipulation.

Speakers:

Lisa Forte
Social Engineering & Cyber Security Expert
Hank Schless
Senior Product Manager, Lookout

You may also be interested in:

No items found.

Excellent Add-On For Cloud Storage

Excellent company to work with, this product enabled wider cloud storage adoption for us by providing an option to encrypt data with separate keys.

Security and Risk Management

50M - 250M USD

May 27, 2022
Read Review

Amazing CASB to Help With Data Security and DLP Integration

Lookout CASB is a great product. Out of all the products reviewed, it was the only product that allowed the data to be secured, regardless of location of endpoint or the data itself, as the security follows the data.

Security and Risk Management

Gov't/PS/ED 5,000 - 50,000 Employees

April 26, 2022
Read Review

Easy and Effective Lookout Deployment

We deployed Lookout on a very small group of users, all company devices. Administration of policies and deployment is effortless compared to other products, and the footprint on devices is very small... Overall a very good experience.

Infrastructure and Operations

<50M USD

April 20, 2022
Read Review
Businesses, governments, and millions of individuals around the world trust Lookout to safeguard their data.
100
Businesses worldwide
200m
Individuals' personal data
205m+
Mobile devices
170m
Mobile apps
16.5k
SaaS apps
100
Threat families
NTT Docomo Logo
Verizon Logo
AT&T Logo
Telefónica Logo
Google Logo
VMWare Logo