Webinar
Code Obfuscation: Techniques, Tools, and Pitfalls to Avoid.
calendar-alt-min
Date:
Jan 29th
calendar-alt-min
Time:
3:00 PM IST / 9:30 AM GMT
calendar-alt-min

Host:
Neal Michie, Subho Halder

About host
Neal Michie - Verimatrix
Neal Michie serves as product manager for Verimatrix’s award-winning code protection solutions. Helping countless organizations instill trust in their IoT and mobile applications, Michie oversees Verimatrix’s foundational security products . He champions the need to position security as a top-notch concern for IoT companies, seeking to elevate code protection to new heights by serving as a sales enabler .Michie brings more than 18 years of software development experience and spent the last decade building highly secure software solutions, including the first to be fully certified by both Mastercard and Visa., Michieis an active participant in some of the industry’s most influential forums
"See you January 29th. at 3:00 PM to find out how Obfuscation is the foundational security layer for your apps"
Subho Halder - appknox

Subho Halder  CISO and Co-Founder of Appknox (Highest rated mobile Security Solution in Gartner and G2Crowd ). Subho will run you through best practices that he has  accumulated from years of experience in Enterprise Security.

Subho is well known in the Security industry as a master hacker and creator of AFE (Android framework for Exploitation). He has also  detected critical loopholes in businesses like Google,Facebook  Microsoft, Skype, and  conducted workshops at conferences like BlackHat, Defcon, ToorCon, SysCan, ClubHack, NullCon, OWASP AppSec and  RSA Conference.
"Are you ready for some fun, learning, and discovery?
Book your slots today! - limited seats"
Code Obfuscation: Techniques, Tools, and Pitfalls to Avoid.

As has been demonstrated in Appknox’s earlier webinar "How to perform manual pentest on mobile apps", mobile apps are an open book to attackers. This makes them and the business they represent a soft target. In this webinar, guest presenter Neal Michie from Verimatrix shows how Obfuscation is the foundational security layer for your apps. Through the webinar you will learn simple, practical steps that can close the book and greatly reduce the risk profile of your app.

Agenda

white_shield_icon
Understanding the technical and business risks of leaving apps unprotected
white_shield_icon

Deep dive into obfuscation techniques

white_shield_icon

Technical solutions from open source tools to going further

white_shield_icon

Plan your steps very carefully as this stage is very important.

Happy Learners
Still need convincing? Check out what people are saying
photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo1
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo3
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo2
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
Photo6
Jenna Simpson
Dropbox
As we passed, I remarked a beautiful church-spire rising above some old elms in the park; and before them, in the midst of a lawn, and some outhouses, an old red house with tall chimneys covered with ivy, and the windows shining in the sun.
This webinar will be of interest to:
  • Security / risk officers

  • Software / Mobile security architects

  • Product Managers

  • Mobile Developers

  • CISO’S