Session sponsored by:
Technology is changing at a rapid pace and attackers are keeping up. Unfortunately, enterprise security is not. Enterprise security teams are tasked with finding solutions for mobile employees living in a post PC era. In this new paradigm, end users leverage personal devices where business and personal data is commingled and shared via cloud based services. As a result, enterprises must now protect devices, networks and data that they no longer fully control. Whether permitting employee owned smartphones to access corporate resources or embracing the cloud, scalability is at an all time high, while control is at an all time low.
Attackers have not missed this trend. They are targeting end users, exploiting weaknesses in mobile apps and easily bypassing traditional security controls with advanced malware. Attackers do not have to adhere to budgets and justify project plans. As such, they are nimble and their techniques continually evolve. For enterprises, staying a step ahead in this cat-and-mouse game is becoming a monumental challenge. Historical security solutions such as host based anti-virus and URL filtering simply cannot in isolation defend against the dynamic attacks that have become the norm.
In this talk, we will walk through a variety of real-world attacks to illustrate the emerging threats that we face today. We’ll then explore how SaaS based security can be a potential solution to protect mobile users on a disparate collection of devices.
About Michael Sutton
Michael Sutton has spent more than a decade in the security industry conducting leading-edge research, building teams of world-class researchers, and educating others on a variety of security topics. As Vice President of Security Research, Michael heads Zscaler ThreatLabZ, the research and development arm of the company. Zscaler ThreatLabZ is responsible for researching emerging topics in web security and developing innovative security controls, which leverage the Zscaler in-the-cloud model. The team is comprised of researchers with a wealth of experience in the security industry. Michael is a frequent speaker at major information security conferences; he is regularly quoted by the media on various information security topics, has authored numerous articles, and is the co-author of Fuzzing: Brute Force Vulnerability Discovery, an Addison-Wesley publication.