Webinar
Unmasking Mobile App Vulnerabilities: Why Open Source Tools Fall Short in Protecting Your App from Digital Fraud
calendar-alt-min
Date:
October 17, 2024 (Thursday)
Time 2
Time:
10:00 AM (WAT)
host
Host:
Raghunandan J Senior (Product Manager Appknox) | Chukwuebuka Ume-Ezeoke, CTO, CED Technologies, Omotayo Ogunlade | Omotayo Group CTO - Onafriq, Omotayo Ogunlade | Chenge Neville, Security Operations Center (SOC) Analyst

Register Now

Speaker
Raghunandan-1

Raghunandan J,  Senior Product Manager Appknox

Product Management Professional with 10 years of experience in building products across, EdTech, Legal and Cybersecurity domains. Hi is currently, advocating clients across geographies to establish & adopt best-in-class security frameworks to mitigate threats proactively.

LinkedIn Twitter
Chukwuebuka-C.-Ume-Ezeoke

Chukwuebuka Ume-Ezeoke, CTO, CED Technologies

He is a technology advisor who is highly driven with keen insights into understanding and interpreting various organizational demands. Over 11+ years of experience and great skills in technology innovation, entrepreneurship, and business management. He has extensive experience in developing and implementing technology strategies, solutions, and transformations for businesses in a variety of industries.

LinkedIn Twitter
How an insecure mobile app can tarnish your company's reputation

This 1-hour power-packed session will help to secure your Software Development Lifecycle.

Agenda

white_shield_icon
Security to your DevOps Lifecycle
white_shield_icon
Mobile App privacy design
white_shield_icon
Security tools for SSDLC
Happy Learners
Still need convincing? Check out what people are saying
photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo1
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo6
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Back Next
This webinar will be of interest to:

  • Mobile Security / Software Architects

  • Mobile Developers

  • CISO’s

  • Security / Risk Officers

  • Product Manager

  • Head of IT Security / Product