Training

Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

Learn the New Threat Vectors Putting Your Mobile Banking Customers at Risk

Learn the New Threat Vectors Putting Your Mobile Banking Customers at Risk

Mobile banking is growing out of its infancy and experts predict it will soon be the dominant banking and payments channel. However, with mobile operating systems and their varying support of security best practices, multiple new threat vectors are being introduced and many are already being widely utilized for malicious purposes. In addition to the rogue mobile apps, a key issue is capturing user credentials which can then be used to gain account access and commit fraudulent transactions.

In this session we will discuss:

  • Which new vectors are being introduced and how do we prepare for them?
  • Why is poor security endemic in mobile applications?
  • Best practices for employing mobile security.

Background

It is estimated that an additional 26 Billion new devices will be connected to the Internet by 2020 - driven by the Internet of Things (wearables, smart factory sensors, online utility meters, automotive systems, etc.)

  • New devices will be lightweight, limited CPU and Memory capabilities (e.g. fitness band)
  • They may have a limited user interface/user display capabilities
  • They will be online with the ability to be updated and share data through the network connection
  • And they can be remotely controlled...

Cybercriminals are noticing this trend, too...and taking advantage. With the growth of smartphone usage and the increase of personal data such as financial information, the threat landscape for mobile is becoming just as prolific.

Register for this session to discover how to combat mobile insecurity.

Webinar Registration

Coming Soon

Request to be notified when this webinar is made available OnDemand.

Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.