Webinars

Explore our library of specialized cybersecurity and app security webinars, available on-demand and for upcoming registration.

Upcoming

Dispelling the myth: is iOS more secure than Android?

April 11th, 3PM CET / 9AM EST

There’s been a long-held belief that iOS mobile apps are more secure than Android apps for reasons like “Apple doesn’t allow sideloading”, their encryption and sandboxing practices, and more. But does this belief really hold true?

Join Benjamin Adolphi, Head of Security Research at Promon, for a live webinar on Thursday April 11th, to find out about the testing methodology and results.

This webinar explores:

  • Why are iOS apps perceived as more secure, and what is the reality?
  • How iOS app encryption is bypassed
  • More about the risks posed by app repackaging
  • How to prevent repackaging attacks
  • OWASP MASVS compliance

On-demand

Predictions for Cybersecurity in 2024

There’s no cybersecurity crystal ball to reveal what 2024 will bring, but clear themes and areas of interest do begin to emerge with the advancement of new technologies and significant events in the ever-evolving threat landscape.

This webinar explores:

  • The escalation of nation-state cyber threats, which are particularly interesting in such a significant global election year 
  • The role of AI and ML in cybersecurity as both a threat and a means of protection 
  • Preparing for the quantum computing era 
  • The growing importance of ethical hacking and bug bounty programs 
  • Vulnerable industries that will have special considerations moving forward 
  • Practical advice for cybersecurity in 2024 

On-demand

How to hack (and secure) an Android app!

Whether you’re a curious enthusiast or a vigilant app developer, this webinar is your gateway to understanding how hackers think, so you can better safeguard your app against potential threats.

What you’ll learn:

  • Understanding attack vectors: Explore the various ways Android apps can be vulnerable to attacks, namely reverse engineering, repackaging, hooking, and debugging
  • Theory vs. practice: Delve into the theoretical concepts behind these attacks and witness their practical execution
  • Tools of the trade: Learn about the tools used by hackers to exploit vulnerabilities
  • Defensive strategies: Discover actionable steps to shield your apps against potential threats