INTERFACE Portland
March 21st, 2025

  Presented by Tony Kelly, Sr Manager, Sales Engineering • Lookout

Cloud breaches are now happening in minutes, not months. Threat actors are exploiting the fact that mobile devices are more susceptible to social engineering, enabling them to gain direct access to cloud infrastructure and swiftly compromise data. Join us for this 50-minute presentation to learn:

  • How the traditional cyber kill chain has evolved to exploit mobile users
  • Why attacks utilizing a mobile device are increasing
  • What makes your organization vulnerable to a modern-day attack
  • Why stopping breaches requires the ability to identify anomalous data movements
  • The three key capabilities you need to defend against modern breaches