

Michael Morello
Today’s workforce isn’t tethered to laptops – it’s powered by mobile. It’s often a primary way many employees connect to email and other mission-critical resources but not treated that way from a security standpoint.
Traditional Mobile Device Management (MDM) solutions weren’t built to detect advanced threats or align with Zero Trust principles. They offer basic control, but not the telemetry, risk context, or threat detection required by today’s federal cybersecurity standards. Meanwhile, the modern kill chain pathway begins with reconnaissance - attackers learn all they can about the target agency and its employees, primarily via social media, including whether they use a single sign-on page. These malicious actors capitalize on the commoditization of advanced malware and ready availability of Malware-as-a-Service kits that make creating these codes an easy task for attackers. One company reported that 60% of mobile devices run on vulnerable operating systems.
In this session, government and industry leaders will explore why legacy mobile management tools are no longer enough—and how agencies can meet federal requirements by extending modern security to the mobile endpoint.