The Five W’s of Mobile Malware: Examining the Who, What, When, Where, and Why
Kevin McPeak - Symantec
Oct 07, 2015Size: 309.0MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractMobile malware is a growing menace, even though many Cybersecurity practitioners don’t fully grasp the situation. This presentation will address the Five W’s of mobile malware, namely: Who is developing it? Who is being affected by it? What exactly is it? When does it get dropped on mobile devices and when does it execute on mobile devices? Where are botnet operations that harvest mobile devices most prevalent? Why is mobile malware developed in the first place? This high-level presentation will stimulate thoughtful discussions and commensurate actions amongst Cybersecurity professionals who are tasked with defending their organization’s people, data and infrastructure.
About the SpeakerKevin McPeak is a Symantec Security & Mobility Architect who is focused on supporting US Government customers. In this capacity, he serves as a technical SME for reputation based malware filtering, endpoint management, endpoint security, data loss prevention, encryption, mobile device management, mobile app management, secure mobile content delivery, and new defensive technologies. Kevin has two Masters of Science degrees, with one being earned at Johns Hopkins University and the other being earned at Virginia Tech. He is also currently a part-time PhD candidate at Virginia Tech’s northern Virginia extension campus. Prior to working for Symantec, Kevin worked for several systems integrators to include CACI, Lockheed Martin, and AlphaInsight. Additionally, Kevin is currently an Army Reserve warrant officer (with over 22 years of continuous service) and in that military capacity he is a veteran of both Operation Enduring Freedom (2003) and Operation Iraqi Freedom (2010 – 2011).
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.