addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwchatcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobegmailgoogleimageimagesinstagramlinklocation-pinmagnifying-glassmailminusmoremuplabelShape 3 + Rectangle 1outlookpersonplusprice-ribbonImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruseryahoo

ISSA-LA and OWASP-LA at Night

IMPORTANT: Please remember to RSVP and pay at

Securing Mobile Apps for the Enterprise

Securing Mobile Apps – that’s the big discussion today. The last couple of years enterprises have been attempting to meet this requirement by deploying client-intensive MDMs (Mobile Device Managers). This has left the apps being utilized by partners, suppliers and customers – completely unprotected. How do we meet the challenge of applying security authentication standards to these un-managed devices. This is what will be discussed/demo’d.

Presentation Break-Out:

  • I. The Condudrum: Secure the Phone or the App?
  • II. History: SMS (System Manangement Server) vs WAM
  • III. Now: MDM vs MAM (Mobile Appplication Managemnt)
  • IV: Advantage of App-Centric Security (MAM)
  • - Modifiable Authentication
  • - No Agent needed
  • - No update needed of client software for workflow/Auth change
  • V: Demo of MAM
  • VI Q.A.

Speaker: Garret Grajek, CTO / COO, SecureAuth Corporation

Garret Grajek is a CISSP-certified security engineer with more than 20 years of experience in the information security and authentication space. As Chief Technical Officer and Chief Operating Officer for SecureAuth Corporation, Garret is responsible for the strategic direction of the company’s Identity Enforcement product offerings.

Prior to co-founding SecureAuth, Grajek held leadership roles at some of the world’s leading technology companies including Cisco and IBM, where he was responsible for consumer and network security products. He also served as western region lead field engineer for RSA Security.

Grajek also worked at Netegrity where he was responsible for field implementation of Access Control products and led installations of SiteMinder, the security suite that controls all user access to the E*Trade Financial Services web site. Netegrity became the standard for internet access control and was acquired by CA.

He began his career as an entrepreneur and founder of an independent programming company that specialized in operating systems and network utilities. A pioneer in the use of the Linux operating system in enterprise environments, Grajek was responsible for the successful completion of numerous projects for IBM, Texas Instruments, Tandem Computers.

Grajek holds bachelor’s degree in computer science from the University of Texas at Austin.


Security Innovation focuses on the most difficult IT Security problem, and the root cause of most data breaches — insecure software applications. For more than a decade, we’ve helped organizations build internal expertise, uncover critical vulnerabilities, and improve the process by which applications are built/ Our solutions are based on the three pillars of a secure Software Development Lifecycle (SDLC), which feed into one another to create an ecosystem of repeatable, secure software development: Standards, Education, and Assessment. The company’s flagship products include TeamProfessor, the industry’s largest library of application security eLearning courses, and TeamMentor, “out of the box” secure development standards.

Palo Alto Networks™ is the network security company. Its innovative platform allowsenterprises, service providers, and government entities to secure their networks and safelyenable the increasingly complex and rapidly growing number of applications running on theirnetworks. The core of Palo Alto Networks’ platform is its Next-Generation Firewall, whichdelivers application, user, and content visibility and control integrated within the firewallthrough its proprietary hardware and software architecture. Palo Alto Networks’ products andservices can address a broad range of network security requirements, from the data centerto the network perimeter, as well as the distributed enterprise, which includes branch officesand a growing number of mobile devices. Palo Alto Networks’ products are used by more than9,000 customers in over 100 countries.

Join or login to comment.

  • Qiu Min J.

    What is the date for April metting? Could you email me

    April 2, 2013

    • Sascha

      April 17,[masked]:30 AM

      April 2, 2013

  • Stan S.

    Great meeting. Thanks everyone. See you in April. Remember to sign up for the Summit on May 21.

    March 21, 2013

  • Stan S.

    Please join us for a great evening. Networking. Education. Fun.

    March 14, 2013

  • Karl M.

    See U there! :)

    February 27, 2013

66 went

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy