- Outlines differences in mobile devices versus PCs - Reviews mobile threat landscape using a hacker mind-set to outline risks and attack vectors - Summarizes the tools and techniques for implementing enterprise countermeasures - Maps mobile to common security compliances including PCI, HIPAA, and CJIS - Provides a defense-in-depth methodology and strategy for enterprises to minimize data loss
Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
Chapter 1. Preparing for Generation Mobile
Chapter 2. Understanding Mobile Data Loss Threats
Chapter 3. Mobile Security Countermeasures
Chapter 4. Ensuring Mobile Compliance
Chapter 5. Developing Your Mobile Device Security Strategy
Michael Raggo (CISSP, NSA-IAM, ACE, CSI) has over 20 years of security research experience. His current focus is threats and countermeasures for the mobile enterprise. Michael is the author of "Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols for Syngress Books. A former security trainer, Michael has briefed international defense agencies including the FBI and Pentagon, is a participating member of the PCI Mobile Task Force, and is a frequent presenter at security conferences, including Black Hat, DEF CON, DoD Cyber Crime, InfoSec, SANS, and OWASP.