Patrick Harr: The Risks of Phishing and Unmanaged Personal Devices in the Modern Workforce

Phishing is anywhere you can send or receive a message.

Smishing and credential harvesting are exploding in the mobile environment, causing headline-making breaches, and having a big impact on businesses. Hackers are using personal smartphones and emails as a backdoor into your employer.

A recent Verizon report shows 70% of mobile devices are not protected from phishing. Hackers know this too and launch phishing attacks on personal apps and successfully reach business systems. Organizations know unprotected devices can access their corporate data, but BYOD has challenges protecting company data and maintaining employees’ privacy.

Join Patrick Harr, CEO SlashNext, as he discusses why the dark web, remote work, and unmanaged personal devices have made phishing attacks so difficult to defeat. You’ll learn:

• What tactics are attackers using to manipulate users
• Mistakes from the latest breaches and how to avoid them
• What strategies you can employ to protect your workforce from fast-evolving phishing attacks

SlashNext is giving away free vouchers to their new Mobile Security – Home app to select attendees.

About The Speaker

Patrick Harr, CEO SlashNext.  As CEO of SlashNext, Patrick Harr directs a workforce of security professionals focused on protecting people and organizations from phishing anywhere. Before SlashNext, Harr was CEO of Panzura, and has held senior executive positions at Hewlett-Packard Enterprise, VMware, BlueCoat, Nirvanix (acquired by Oracle), and Preventsys (acquired by McAfee).

BONUS:  Cocktail hour presentation…

Modernize Your Email Security

Double Your Protection for Half the Cost

Phishing and malware threats are hiding behind trusted services as part of the evolution of hackers using trusted domains to host their attacks. The benefit of using trusted domains, is they are very hard to detect with reputation -based and relationship graph threat detection, which is being used widely by organizations to protect users.

Trusted domains are used for a variety of reasons, but primary it gives attackers more anonymity. It’s hard for users to identify with training skills, and takedown of this malicious content is often more complex giving hackers more time to perpetrate these attacks.

Join the discussion to explore:

  • What tactics are being used to avoid detection
  • Strategies to overcomes evasive techniques like Captcha & IP restrictions
  • What strategies you can employ to protect your workforce from fast-evolving phishing attacks


Confirmed Top Global CISOs, Top InfoSec Innovators, Baby and Black Unicorns Grab Your Rooms before the hotel runs out of space.

If you've been confirmed by the Cyber Defense Awards team, book your room today, by clicking here.