Webinar chapters

  • 1:09 Mobile spyware in the news
  • 2:46 The rise of Pegasus and a look back at the history of Pegasus
  • 8:54 Pegasus: how it works
  • 11:59 Zero-day threats
  • 14:04 App permissions, privacy and access to sensitive data
  • 15:22 Recent targets of mobile spyware
  • 16:38 Overview of threats in the modern workplace
  • 18:50 How user behavior can open the door to risk
  • 20:53 How phishing is the number 1 global threat
  • 22:40 How to assess the risk of mobile malware
  • 26:04 How mobile is the gateway to business applications
  • 26:34 How hybrid work is creating new risks for individuals and businesses
  • 27:55 Hybrid work requires a layered approach to security
  • 29:28 Reimagining security for the new ways of working
  • 30:43 The requirement for continuous monitoring and research
  • 31:30 Monitoring for Indicators of Compromise for Pegasus
  • 35:52 Defending against Pegasus
  • 40:41 The risks surrounding hybrid work