Part 2 of a series on threats to mobile devices and through mobile devices. Tactics and techniques to deal with those threats.
Cohost: Tom Dean – Consulting Ventures
- Tom has decades in capital goods manufacturing industry (fortune 500 scale)
Years of experience in marketing, sales & interfacing with independent dealers/distributors (small/medium scale)Current focus is strategy & risk management consultingLifelong learner and an interest in technology.Strategy + risk management ---> mobile devicesTopics:
- Apple find my network; useful feature, but privacy considerations
SSO risks where there are too many items that can be compromised if there is a single compromise of a single systemOut of band SMSProblems with Twilio and 10DLC for VOIP SMSKnow your customer regulations, implications with SMS validation for ownership establishmentSynology came up with their own Synology MFA app and the problems with thatDo not call registry updates; Good news!