Cyberwarfare / Nation-State Attacks , Fraud Management & Cybercrime , Healthcare

Pharma Discussion | Mitigating Phishing in the Era of Mobile Devices

2021 Pharmaceutical Threat Outlook

Because pharmaceutical intellectual property is so valuable, it is the target of both private and state-sponsored cyberattackers. In 2020 alone, authorities in both the U.S. and the U.K. issued official warnings about potential attacks against pharmaceutical companies related to COVID-19 research.

View this webinar to learn about:

  • A look into real-life mobile threat data from the pharma industry
  • The entry points attackers are using to target your mobile device
  • Securing mobile endpoints to protect IP
  • The risks mobile devices have introduced into your organization

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from the North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global Summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.