——————from the CIS (center for internet security) page:—-
Sex, Lies and Mobile Devices: The Seedy Underworld of Mobile [In]security
Thursday, August 17, 2017 | 3:00 pm EST
The smartphone in your pocket has transformed, quite literally, every facet of your life.
From commerce and communications to entertainment and awareness, mobile devices have become our most prized possessions, almost overnight. But along with these amazing advances in technology have come very serious security and privacy risks, many of which go unnoticed, unmanaged or even unknown. The device in your pocket has become the Big Brother we always feared, and the worst part is this – you agreed to it. Join GreyCastle Security as we demystify the security and privacy risks of your smartphone and provide practical tips for dealing with this new phenomena.
What you’ll learn:
- Attendees will understand the level of personal data that is freely created by your mobile device
- Possible scenarios of how institutions plan to use or distribute your information with(out) your consent
- Implementable prevention tactics to minimize your risk
Reg Harnish is an entrepreneur, speaker, author, and CEO of GreyCastle Security, a leading cybersecurity firm headquartered in Troy, New York.
With nearly two decades of experience practicing cybersecurity, Reg brings a thought-provoking perspective to the industry that has earned him many prestigious recognitions, including a fellowship at the National Cybersecurity Institute and the designation of Cybersecurity Consultant of the Year in North America for 2017.
Reg is a nationally-recognized speaker and has presented at countless industry and security events for organizations including Security BSides, ISSA, ISC2, ISACA, InfraGard and many others.
In addition to co-authoring several books on cybersecurity awareness, he has written several editorial pieces for Forbes.com as a member of the Forbes Technology Council, an invitation-only organization for senior-level technology executives. His successes and expert commentary also have been featured in Time, CIO Magazine, Dark Matter, Software Magazine, ComputerWorld, InfoWorld, and Security Magazine.