filmov
tv
Breaking into Cybersecurity: The Current Mobile Security Landscape
![preview_player](https://i.ytimg.com/vi/PuxYf5RvP8U/hqdefault.jpg)
Показать описание
In this episode, we dive into the rapidly evolving mobile security landscape, exploring how the rise in SIM swap attacks and data breaches shapes the market. We discuss the future of secure mobile services, highlighting key trends and challenges consumers must know. We also debunk common misconceptions about mobile security, particularly around SIM swaps, and offer practical advice on how individuals can protect themselves. Finally, we examine the critical features and practices that make a mobile service truly secure and why these still need to be widely adopted across the industry. Don't miss this insightful discussion on staying safe in the mobile world.
Mark Kreitzman is a seasoned cybersecurity expert with over twenty-five years of experience building cybersecurity companies. He has deep insights into the evolving threats to digital assets, with a particular focus on mobile security and data privacy. Mark's extensive background in cybersecurity makes him an invaluable resource for discussing current and emerging threats in our increasingly mobile and digitized world, as well as how to mitigate personal and business risks related to mobile communications.
The Breaking into Cybersecurity: It’s a conversation about what they did before, why they pivoted into cyber, what process they went through to Break into Cybersecurity, how they keep up, and advice/tips/tricks along the way.
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Check out our books:
_________________________________________
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.
Mark Kreitzman is a seasoned cybersecurity expert with over twenty-five years of experience building cybersecurity companies. He has deep insights into the evolving threats to digital assets, with a particular focus on mobile security and data privacy. Mark's extensive background in cybersecurity makes him an invaluable resource for discussing current and emerging threats in our increasingly mobile and digitized world, as well as how to mitigate personal and business risks related to mobile communications.
The Breaking into Cybersecurity: It’s a conversation about what they did before, why they pivoted into cyber, what process they went through to Break into Cybersecurity, how they keep up, and advice/tips/tricks along the way.
The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.
Check out our books:
_________________________________________
About the hosts:
Christophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.