Webinars

Explore our library of specialized cybersecurity and app security webinars, available on-demand and for upcoming registration.

On-demand

Dispelling the myth: is iOS more secure than Android?

There’s been a long-held belief that iOS mobile apps are more secure than Android apps for reasons like “Apple doesn’t allow sideloading”, their encryption and sandboxing practices, and more. But does this belief really hold true?

In this webinar, Benjamin Adolphi, Head of Security Research at Promon, shares insights from our Q1 2024 App Threat Report and will unpack:

This webinar explores:

– How iOS app security differs from Android app considerations
– The recent ruling by the Digital Markets Act (DMA) allowing sideloading for iOS apps
– Multilayered app protection strategies, including runtime and obfuscation

On-demand

Predictions for Cybersecurity in 2024

There’s no cybersecurity crystal ball to reveal what 2024 will bring, but clear themes and areas of interest do begin to emerge with the advancement of new technologies and significant events in the ever-evolving threat landscape.

This webinar explores:

  • The escalation of nation-state cyber threats, which are particularly interesting in such a significant global election year 
  • The role of AI and ML in cybersecurity as both a threat and a means of protection 
  • Preparing for the quantum computing era 
  • The growing importance of ethical hacking and bug bounty programs 
  • Vulnerable industries that will have special considerations moving forward 
  • Practical advice for cybersecurity in 2024 

On-demand

How to hack (and secure) an Android app!

Whether you’re a curious enthusiast or a vigilant app developer, this webinar is your gateway to understanding how hackers think, so you can better safeguard your app against potential threats.

What you’ll learn:

  • Understanding attack vectors: Explore the various ways Android apps can be vulnerable to attacks, namely reverse engineering, repackaging, hooking, and debugging
  • Theory vs. practice: Delve into the theoretical concepts behind these attacks and witness their practical execution
  • Tools of the trade: Learn about the tools used by hackers to exploit vulnerabilities
  • Defensive strategies: Discover actionable steps to shield your apps against potential threats