www.cshub.com Open in urlscan Pro
54.227.24.106  Public Scan

URL: https://www.cshub.com/threat-defense/webinars/runtime-application-self-protection-threats-and-antidotes
Submission: On August 26 via api from SG

Form analysis 3 forms found in the DOM

GET https://www.cshub.com/search

<form method="GET" action="https://www.cshub.com/search">
  <div class="input-group col-md-12 pr-0">
    <input id="query-input" name="q" type="text" class="search-query form-control" placeholder="Search..." style="padding: 0.375rem 0.75rem;">
    <span class="input-group-btn">
      <button class="input-group-text" style="background: none; border: none; padding: 0.375rem 0.75rem;" id="searchPrepend"><i class="fas fa-search"></i></button>
    </span>
  </div>
</form>

GET https://www.cshub.com/search

<form method="GET" action="https://www.cshub.com/search">
  <div class="input-group col-md-12 pr-0">
    <input id="query-input" name="q" type="text" class="search-query form-control" placeholder="Search..." style="padding: 0.375rem 0.75rem;">
    <span class="input-group-btn mt-2">
      <button class="input-group-text" style="background: none; border: none; padding: 0.375rem 0.75rem;" id="searchPrepend"><i class="fas fa-search"></i></button>
    </span>
  </div>
</form>

POST https://www.cshub.com/register/email?ty-pej

<form action="https://www.cshub.com/register/email?ty-pej" method="post">
  <input type="hidden" name="_token" value="pOMhYaz4ZY44WiAldkMbqVqZrGzhUKxOVDQtHTfL">
  <div class="form-group col-12 mb-1">
    <input type="text" name="email" class="form-control text-center rounded-0" placeholder="Business Email" required="" value="">
  </div>
  <div class="form-group col-12">
    <button type="submit" class="btn btn-info btn-block rounded-0 text-uppercase">Subscribe</button>
  </div>
</form>

Text Content

×
Cyber Security Hub
IQPC Digital
Get - On the Play Store
INSTALL

 * Content
   Articles Case Studies Demos Interviews News Podcasts Reports Videos
   Whitepapers
 * Events
   Conferences Exchanges Online Events Webinars
 * My Network
 * About
   About Us About Membership Elite Sponsors Advertise With Us Partners
   Contributors Contact Us Advisory Board
 * 
 * Sign In
 * Get Started

 * Content
   Articles
   Case Studies
   Demos
   Interviews
   News
   Podcasts
   Reports
   Videos
   Whitepapers
 * Events
   Conferences
   Exchanges
   Online Events
   Webinars
 * My Network
 * About
   About Us
   About Membership
   Elite Sponsors
   Advertise With Us
   Partners
   Contributors
   Contact Us
   Advisory Board
 * Sign In
 * Sign Up


Attacks Cloud Data Executive Decisions IoT Malware Mobile Network Security
Strategy Threat Defense
Filter Categories
Attacks Cloud Data Executive Decisions IoT Malware Mobile Network Security
Strategy Threat Defense


RUNTIME APPLICATION SELF-PROTECTION – THREATS AND ANTIDOTES

Register

--------------------------------------------------------------------------------

This webinar will take place on:
08 September, 2021
02:00 PM - 02:45 PM SGT
Add To Calendar
Outlook / iCal Outlook Web Google Yahoo
AddThis Sharing Buttons
Share to FacebookFacebookShare to TwitterTwitterShare to LinkedInLinkedInShare
to EmailEmailShare to PrintPrintShare to MoreAddThis

--------------------------------------------------------------------------------




This webinar provides an opportunity for attendees to take a deep dive into the
most dangerous security vulnerabilities in the mobile application world. We will
talk about the most common mobile threats on mobile Android and iOS platforms.

During the webinar we will discuss which of the most common threats are the most
dangerous for enterprises in terms of financial losses. We will compare security
capabilities on Android and iOS platforms. Finally we will talk about best
security practices to detect and prevent such threats on each platform with
heuristic methods and AI based security solutions.

Described techniques and mechanisms will helps you choose between most common
security solutions on the market to find the best for clients of mobile
financial services.

During this webinar you will learn how to detect:

 * Root and Jailbreak
 * Debuggers, VM and Emulators

You will find out how to prevent most common attacks based on:

 * Overlays 
 * Screen Readers
 * Key Logges 
 * Application Re-Packing
 * Code Injection

--------------------------------------------------------------------------------

Speaker

Paweł Bułat
Cyber Security Department Manager
Comarch

Pawel is a manager of the Cyber Security Department, dedicated to delivering
commercial products and services for Comarch’s clients all over the world. He
has over 12 years of cyber security related professional experience in finance,
telco, public administration.


Sponsor

--------------------------------------------------------------------------------

Register

FIND CONTENT BY TYPE

 * News
 * Case Studies
 * Interviews
 * White Papers
 * Videos
 * Podcasts

CYBER SECURITY HUB
COMMUNITY

 * Power10
 * About Us
 * Contact Us
 * Become a Member Today
 * Advertise with us
 * Cookie Policy
 * User Agreement
 * Become a Contributor

ADVERTISE WITH US

Reach Cyber Security professionals through cost-effective marketing
opportunities to deliver your message, position yourself as a thought leader,
and introduce new products, techniques and strategies to the market.

LEARN MORE

JOIN THE CYBER SECURITY HUB
COMMUNITY

Join CSHUB today and interact with a vibrant network of professionals, keeping
up to date with the industry by accessing our wealth of articles, videos, live
conferences and more.

SIGN UP TODAY!

Cyber Security Hub, a division of IQPC
© 2021 All rights reserved. Use of this site constitutes acceptance of our User
Agreement and Privacy Policy.

Careers With IQPC | Contact Us | About Us | Cookie Policy

 *  
 *  
 *  
 *  
 *  


×


Become a Member today!

PLEASE ENTER YOUR EMAIL TO JOIN FOR FREE

Subscribe

Already an IQPC Community Member?
Sign in Here or Forgot Password
Sign up now and get FREE access to our extensive library of reports,
infographics, whitepapers, webinars and online events from the world’s foremost
thought leaders.

We respect your privacy, by clicking 'Subscribe' you will receive our
e-newsletter, including information on Podcasts, Webinars, event discounts,
online learning opportunities and agree to our User Agreement. You have the
right to object. For further information on how we process and monitor your
personal data click here. You can unsubscribe at any time.


We use cookies and similar technologies to recognize your visits and
preferences, as well as to measure the effectiveness of campaigns and analyze
traffic.
To learn more about cookies, including how to disable them, view our Cookie
Policy Close
AddThis Sharing Sidebar
Share to FacebookFacebook
, Number of shares
Share to TwitterTwitterShare to LinkedInLinkedInShare to EmailEmailShare to
PrintPrintMore AddThis Share optionsAddThis
, Number of shares
Hide
Show
Close

AddThis

AddThis Sharing
SHARESFacebookTwitterLinkedInEmailPrintAddThis

Powered byPicreel