Zimperium logo

On-Demand Webinar:
The Mobile Security Deadly Sin of Sharing Executives’ Locations, Calendars and/or Contacts

Copyright © 2010 - 2019, Zimperium, Inc. All Rights Reserved

Indochino

Immediate Access to Recording

Your email and personal information are confidential, and will not be sold or rented. For further information, read our Privacy Policy.

Most organizations now realize that mobile devices are an unprotected endpoint with access to, or containing all of the information of a traditional endpoint. And while there are some overlaps in what you protect, the way you solve the traditional endpoint security problem is completely different than how you solve the mobile security problem.

The chief information security officer (CISO), responsible for an organization's information and data security, has the unenviable challenge of maintaining control in a BYOD culture.

In order to help organizations of all sizes proactively protect employees and data from mobile threats, Zimperium is hosting a series of webinars focusing on seven of the problem areas, or deadly sins, CISOs must address. 

In this webinar, we discuss the deadly sin of allowing hackers to access executives' locations, calendars and/or contacts. Watch the recording to learn about:

  • Examples of how hackers can leverage an executive’s location, calendar and contacts
  • How protecting location, calendar, and contacts differs on desktop vs mobile
  • What can be done to prevent hackers from accessing executives’ location, calendar and contacts