Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Compliance Theater vs Real Security - Mobile Device Security Beyond Audits

Jamf via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the critical gap between compliance checkboxes and genuine mobile security protection in this 40-minute conference talk from JNUC2025. Discover why traditional compliance frameworks like NIST, NIS 2, and Cyber Essentials Plus fall short of addressing real-world mobile threats, and learn practical strategies to implement effective security measures that go beyond audit requirements. Examine the current mobile threat landscape, including the staggering 10 million phishing attacks targeting mobile devices in 2024, and understand why attackers increasingly focus on mobile platforms as mission-critical business tools. Master automated iOS software update deployment using Jamf blueprints and declarative device management to maintain security without manual intervention. Implement on-device content filtering (ODCF) for real-time phishing protection that operates without requiring VPN connections, providing seamless security for users. Configure Android work profile management to achieve BYOD compliance while maintaining separation between personal and corporate data. Deploy zero-trust network access (ZTNA) solutions using Apple's network relay framework to secure network connections without compromising user experience. Understand device attestation techniques that provide secure access while eliminating user friction through biometric authentication methods. Learn to map compliance requirements from major frameworks directly to Jamf platform capabilities, ensuring both regulatory adherence and practical security outcomes. Utilize mobile compliance assessment tools for organizational self-evaluation and gap analysis. Watch live demonstrations of phishing protection mechanisms, device attestation workflows, and compliance assessment procedures. Gain insights into making security the easiest path for users, exemplified through Apple Face ID integration, and explore Jamf's unified approach combining mobile device management (MDM), mobile threat defense (MTD), and zero-trust network access in a single platform.

Syllabus

0:00 Introduction: Compliance Theater vs Real Security
0:52 Mobile Devices: From Luxury to Mission-Critical Business Tools
3:59 Mobile Threat Landscape: Why Attackers Target Mobile Devices
6:04 Compliance Frameworks Now Mandate Mobile Security
10:06 Framework #1: Device Configuration and Management MDM
14:56 Framework #2: Keeping Devices Healthy and Threat-Free
16:23 Phishing Attacks: 10 Million Mobile Phishing Attempts in 2024
18:45 On-Device Content Filtering ODCF for Real-Time Phishing Protection
20:14 Framework #3: Data Protection with Encryption and Baseline Settings
21:01 Android Work Profile Management for BYOD Compliance
24:42 Framework #4: Secure Access Controls with ZTNA
31:14 Making Security the Easiest Way: Apple Face ID Example
33:44 Jamf for Mobile: Unified MDM, MTD, and ZTNA Platform

Taught by

Jamf

Reviews

Start your review of Compliance Theater vs Real Security - Mobile Device Security Beyond Audits

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.