Tuesday, February 27th, 2024

Protecting Consumer Data: Enhancing the Security of Your Mobile Applications

4:00pm - 5:30pm ET | Virtual

Event Overview

In today’s digital landscape, consumer-focused mobile and web applications play a pivotal role in facilitating financial transactions, enabling payments, and providing access to sensitive data. However, these applications often operate in public-facing domains beyond our direct control, making them susceptible to various external threats such as reverse engineering, tampering, malware, and cloning attacks. Given their significance in handling customer data and intellectual property, there is an escalating need to safeguard applications and the users who depend on them in the external environment.

DISCUSSION POINTS

  • How to effectively evaluate the security and pinpoint vulnerabilities in your consumer-facing mobile applications
  • Exploring tools and solutions for real-time monitoring of applications, with a focus on mitigating external attacks and ensuring compliance with regulations
  • Strategies for seamlessly integrating security measures into the entire lifecycle of consumer applications, from the initial development stages to deployment and ongoing maintenance

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Moderator

Jerry Cochran

Deputy CIO

Pacific Northwest National Laboratory

Tom Powledge 

SVP for Cybersecurity 

Verimatrix

Speakers

Join Tom Powledge, Senior Vice President of Cybersecurity at event sponsor Verimatrix, to discuss the oversight of security with mobile apps, and come away with strategies you can implement to secure third party access to your data.

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Get an Exclusive Sneak Peek of this Roundtable!

Venue

Steak 48, Houston

4444 Westheimer Rd., Houston, TX 77027

Underwritten by

Verimatrix helps power the modern connected world with security made for people. We protect digital content, applications, and devices with intuitive, people-centered, and frictionless security. We enable the trusted connections our customers depend on to deliver compelling content and experiences to millions of consumers around the world.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

March 6, 2024

Driving Autonomy and Automation to Maximize Security Defenses

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

March 13, 2024

CIO Business Transformation Awards and Summit

June 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru​

April 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare

Upcoming ISMG Events

March 6, 2024

Driving Autonomy and Automation to Maximize Security Defenses

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

March 13, 2024

CIO Business Transformation Awards and Summit