Step One: increase awareness related to global threats at the mobile application coding level.
There is so much misinformation related to security. Our focus will be "show" versus academic speculation (Ceteris paribus). Security is a moving target and nothing is equal or fair.
Product and technology leaders encouraged to attend. Presentations developed for the novice trying to understand risk and advanced coders developing countermeasures to protect intellectual property, data and credentials.
The scope includes iOS, Android and Windows mobile devices. Topics will include reverse engineering, and PEN testing for mobile e.g. wallets, mobile payment, virtual currency, secure elements, authentication, biometrics and tokenization.
Lets get together to increase awareness related to techniques criminals use to expose intellectual property and insert malicious code to create malware.
Researchers have proven mobile malware can defeat Bring Your Own Device (BYOD), Anti-Malware and Anti-Virus. This can include using mobile for Advance Persistent Threats distributed via docking, SMS and a wireless jailbreak.
Malware was utilized to hack Target point of sale and other retailers. This will be an emerging threat in 2014 as mobile commerce increases and foreign sponsored criminals increase their capability.
Meetings will include ethical hacking demonstrations.