The Trojan Horse of BYOD
This talk will show how a malicious app can take advantage of a rooted phone. This is interesting in the current BYOD climate that reigns in corporations. Besides discussing technical vulnerabilities that are being exploited we will also go into a number of solutions that can be used by companies to minimize the associated risk.
Privacy, Governance & Risk Management
Stéphanie Vanroelen, Senior Pen Tester, Nynox
Stephanie is an IT security consultant currently focussing on Web and Mobile Application Security. Her experiences in organizing IT Security conferences such as BruCON and CyberSKool help her with project management and communication skills. In her free time she pretends to be Godzilla :)