Mobile banking is growing out of its infancy and experts predict it will soon be the dominant banking and payments channel. With the vast array of endpoints being utilized, multiple threat vectors are being introduced. How are the threats of rogue mobile apps, mobile malware and SMiShing evolving? What are the risks inherent in mobile payments? This session reviews these emerging mobile malware threats, their impact on banking institutions and the latest technology solutions to help mitigate the risks.
Additional Summit Insight: Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.
Mobile has become the new security battlefield in which hackers and businesses are waging the internet-old battle of breach vs. protection. From infiltrating jailbroken devices to decompiling and recompiling apps to tainting source code, hackers are continually finding new ways to prove the mobile app infrastructure vulnerable. This session reviews these emerging mobile malware threats, their impact on banking institutions and the latest technology solutions to help mitigate the risks.
David Duncan, Chief Marketing Officer at Webroot will kick-off the presentation with a discussion on the impact of mobile fraud and strategies for combating threats. The agenda will cover:
Today's Fraud Threats
The Growth of Malicious Apps
Preparing for Combat
The Rewards for Getting It Right
Deterrent to Mobile Banking Adoption
Mobile Banking Growth
John Walker, Director of CSIRT and Cyber Forensics at Cytelligence will round out the session with a discussion on the challenges of modern day security, why conventional security does not work, explain the risk of unknown unknowns, and present examples of real-world cases of insecurity.
This session was recorded during the 2014 Fraud Summit London. Additional recordings include:
Duncan brings 30 years of senior marketing and security experience. Most recently, he was responsible for developing and leading the CyberSafe secure storage go-to-market product strategy for Imation Corporation, having joined Imation after the acquisition of EncryptX in 2011, where he was founder, president and managing director for 10 years. Duncan also served on McAfee's embedded solutions advisory committee. Prior to EncryptX, Duncan held several executive marketing positions, including senior vice president of marketing for Tactical Marketing Ventures, a consulting company that developed go-to-market strategy and tactics for more than 150 technology companies.
Director of Global Events Content and Executive Editor, BankInfoSecurity & CUInfoSecurity
A veteran journalist with more than 20 years' experience, Kitten has covered the financial sector for the last 13 years. Before joining Information Security Media Group in 2010, where she now serves as director of global events content and executive editor of BankInfoSecurity and CUInfoSecurity, she covered the financial self-service industry as the senior editor of ATMmarketplace, part of Networld Media. Kitten has been a regular speaker at domestic and international conferences, and was the keynote at ATMIA's U.S. and Canadian conferences in 2009. She has been quoted by CNN.com, ABC News, Bankrate.com and MSN Money.
Director of CSIRT and Cyber Forensics, Cytelligence
Walker has over 30 years of operational security experience, commencing with nuclear security with the Royal Air Force during the Cold War, through some of the earliest virus outbreaks, including those that hit the Ministry of Defence, to counter intelligence, working with CESG, MOD, HQP&SS [SR], and a sensitive satellite intelligence unit. Later roles included high-level information security roles with BEA Systems supporting the Eurofighter programme, General Motors in 1998 working with EDS, and Experian. Walker has been a visiting professor at Nottingham Trent University and held the UK Government's position of chair of the ISO/IEC 27001 steering committee. He has authored 100 global papers, speaks globally at various security conferences and has been published in multiple publications.