CONTACT

Mobile Security Masterclass

Advanced Cyber Defense for the Federal Landscape

Mobile device use in federal operations is continuing to spread rapidly. With that comes the requirement to not only manage but also secure these the devices and their applications.

In a recent conversation with Kern Smith, Vice President of Global Presales at Zimperium, we explored the increasing significance of mobile security in federal operations. Kern, with over a decade of experience in mobile security, shared expert insights on how federal agencies can navigate the constantly evolving landscape of mobile threats. This discussion, a three-part series, delves into the critical aspects of mobile security within federal agencies, focusing on emerging threats, regulatory requirements, and advanced defense strategies. With mobile devices becoming an integral part of federal operations, safeguarding these tools is essential to maintaining the integrity of government data and infrastructure.

Each session is designed to empower federal IT managers and cybersecurity experts with actionable insights and best practices tailored to the unique challenges of federal environments. Our expert-led discussions will help you stay ahead of mobile threats, ensure compliance with federal regulations, and implement industry-leading frameworks like MITRE ATT&CK.

Session 1

Navigating the Mobile Threat Landscape: Key Insights and Protective Strategies for Federal Agencies

Mobile devices are vital tools within federal agencies, yet they pose significant security risks that demand vigilant attention. This webinar addresses the unique mobile security challenges and solutions pertinent to government agencies.

In this session, federal agencies will gain insights into:

  • The Current Threat Landscape: Detailed insights into emerging cyber threats targeting mobile devices, including sophisticated malware, phishing schemes, and vulnerabilities specific to government applications.
  • Robust Protection Strategies: Discover advanced security measures and best practices designed for federal agencies, including cutting-edge tools, secure device management protocols, and comprehensive employee training.
  • Effective Incident Response: Gain critical strategies for managing and mitigating mobile security incidents, with a focus on compliance and recovery within a federal context.
  • Risk Assessment Frameworks: Learn how to conduct thorough risk assessments tailored to the unique requirements of federal environments and manage mobile device security effectively.

Session 2

Decoding Mobile Security Requirements: NIST Guidelines and Regulatory Compliance

Mobile security is more than just a priority—it’s a necessity. With increasing mobile device usage and sophisticated cyber threats, understanding how to effectively secure mobile environments while adhering to federal regulations is critical.

In this session, federal agencies will learn about:

  • Staying Ahead of Emerging Threats: Discover how recent trends and evolving threats impact mobile security, and why compliance with NIST guidelines and federal regulations is more urgent than ever.
  • Practical Insights and Strategies: Learn actionable strategies for implementing NIST’s Mobile Security Framework within your agency’s mobile infrastructure, including risk management, device management, and incident response techniques.
  • Expert Guidance: Hear from leading experts in mobile security and federal IT compliance, and gain firsthand insights into best practices and common pitfalls.

Session 3

Mastering Mobile Defense: Implementing the MITRE ATT&CK Framework for Real-World Protection

In today’s rapidly evolving digital landscape, mobile devices are indispensable to federal operations, yet they are increasingly vulnerable to sophisticated attacks. To stay ahead of these threats, federal IT managers need cutting-edge solutions that provide comprehensive defense mechanisms. The MITRE ATT&CK Framework offers a powerful approach to enhancing mobile security by detailing adversary tactics and techniques specific to mobile environments.

This session will empower you to effectively integrate the MITRE ATT&CK Framework into your mobile security strategy. You’ll gain invaluable insights into:

  • Enhanced Threat Detection: Discover how recent trends and evolving threats impact mobile security, and why compliance with NIST guidelines and federal regulations is more urgent than ever.
  • Streamlined Incident Response: Implement efficient procedures to respond quickly and effectively to security incidents.
  • Fortifying Data Protection: Strengthen defenses to protect sensitive information on mobile devices from potential breaches.

 

Panelists

chris-hauser-headshot

Chris Hauser - Director, Sales Engineering

Merlin Cyber

Chris Hauser is a seasoned cybersecurity expert and currently serves as the Director of Sales Engineering at Merlin Cyber, where he has been leading efforts to deliver advanced cybersecurity solutions since February 2024. Prior to this, he spent nine years at Imperva, specializing in web application firewalls with BOT protection, DDoS mitigation, and data security, while serving as a Sales Engineering Manager supporting federal customers. With a strong background in cybersecurity sales engineering at companies like Leidos and Dell EMC, Chris has a proven track record of driving strategic cybersecurity initiatives for both commercial and federal sectors.

kern-smith-zimperium-headshot

Kern Smith - VP, Global Pre-Sales

Zimperium

With over a decade of experience in mobile security, Kern is a distinguished consultant and technical sales leader renowned for his impact on large enterprises and government agencies. He has spearheaded the deployment of cutting-edge mobile security solutions, driving significant advancements and protecting critical assets. Kern’s expertise in building and leading high-performing technical sales teams has been instrumental in achieving remarkable growth and delivering unparalleled value to clients. Recognized for his innovative approach and thought leadership, Kern continues to shape the future of mobile security while fostering a culture of excellence and dedication in his field.