Protect Your Agency's Data from Adversa...
In this webinar, Jim Coyle, Federal Security Strategist at Lookout and Frank Srp, Senior Technical Marketing Engineer at Lookout, will explain the importance of government agencies taking proactive steps to protect their mobile devices from attacks. With Lookout's Moible Endpoint Security, your organization can go above and beyond compliance with state government bans and federal OMB M-23-12. Don't miss this opportunity to learn how Lookout's...
Zero Trust for Smartphones
On behalf of Lookout and Carahsoft, we would like to invite you to join our webinar on mobile security for U.S. civilian agencies. Attendees of this webinar will hear the following topics: Colonial Pipeline attack BYOD/Unmanaged Smartphone Protection – Complete security is needed Vulnerable entry points into your infrastructure Software-defined perimeter & Continuous / Conditional access controls Smartphones accessing your VPN? Ranso...
Virtual Lunch & Learn: Where does mobil...
Lookout is hosting a lunch and learn webinar discussion on how mobile fits into guidance provided by organizations like NIST and CIS, how that affects compliance and security policies, and why it should matter to organizations everywhere. Join Tim Lemaster and Hank Schless as they chat about this over lunch (our treat) and answer any questions you may have about how smartphones and tablets fit into your security strategy. Register today to sav...
December 16, 2020
Organizer:
Lookout Location:
Webcast
Understanding Chromebook Security
Google Chromebooks are a popular choice for students and employees looking for an affordable laptop to browse the web and connect to their cloud applications. By applying a defense-in-depth approach to Chromebooks, Google has built-in several layers of security to keep its customers at ease. In this webinar, Lookout takes a closer look at Chrome OS security to provide some additional insight based on our in-depth knowledge of the mobile threat...
December 9, 2020
Organizer:
Lookout Location:
Webcast
Understanding Chromebook Security
Google Chromebooks are a popular choice for students and employees looking for an affordable laptop to browse the web and connect to their cloud applications. By applying a defense-in-depth approach to Chromebooks, Google has built-in several layers of security to keep its customers at ease. In this webinar, Lookout takes a closer look at Chrome OS security to provide some additional insight based on our in-depth knowledge of the mobile threat...
December 9, 2020
Organizer:
Lookout Location:
Webcast
Cyber Security Digital Summit: Security...
Security in Motion is a virtual event focused on protecting the modern endpoint. Global corporate enterprise has forever been redesigned to a mobile first stance. In response, the Summit unpacks key issues CISOs face when continuing the evolution to securing that mobile reality. Sessions include: Threat Hunting on the Move: Phishing, Vishing, Smishing, Oh My! Securing Your Remote Workforce The Modern Endpoint Security: Challenges & Opportu...
Phishing Threats in a Post-Perimeter World
Our second topic in the series, “Phishing Threats in a Post-Perimeter World,” will take place on Thursday, October 10th in Tyson's Corner, VA. Leading cybersecurity experts will moderate a panel discussion on the evolution of mobile phishing and the critical reasons why CISOs must think differently about security to protect data from modern phishing attacks. This can't-miss advisory panel will combine the perspectives of government...
October 10, 2019
Organizer:
Lookout Location:
Mclean, VA
Next Generation Managing and Securing Y...
Hear from CCS analyst, Nick McQuire, BlackBerry's CTO, Charles Eagan, and Lookout's CSO, Aaron Cockerill, on how the mobile landscape has progressed and how businesses need to adapt to securely manage employee devices.Join BlackBerry and Lookout to learn how the combination of BlackBerry UEM, BlackBerry Dynamics, and Lookout protect sensitive corporate information for both managed and unmanaged mobile devices.Webinar topics include:What to exp...
Mastering Mobile Security with BlackBer...
Mobile devices are critical to every organization's digital transformation initiative, but for hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network. In fact, 20% of all businesses were breached last year and an even larger number has no idea whether they've experiences a mobile attack, according to a recent survey conducted by Dimensional Research. You're invited to view our on-demand...
BlackBerry Breakfast Briefing
Mobile devices are critical to every organization's digital transformation initiative. But for hackers set on stealing sensitive business data, mobile devices are the new back door to the enterprise network. In fact, 20% of all businesses were breached last year and an even larger number has no idea whether they've experienced a mobile attack, according to a recent survey conducted by Dimensional Research.You're invited to spend time with Blac...
You must be logged in to view details.
Membership is Free!
Please enter your email and password:
Please sign in with your email and password:
LinkedIn is experiencing technical difficulties. Please log in via email and password. If you do not remember your password, please click "Forgot Password" to reset.