Speakers profile

Mr. Touhid Shaikh
Security Expert

Touhid is working as a Security Consultant at SecureLayer7 and has a expertise in cloud Penetration Testing and other technologies. Touhid also has a hands-on Exploit Development experience and has already written exploits for Metasploit Framework, which currently is a part of it. Touhid usually participates in CTF challenges and other Cyber Security Competition and often does Bug Bounty Hunting.

About the Webinar

Phishing and Malware attacks on the mobile devices of remote workers have become quite common to gain access to sensitive enterprise data. A thorough discourse about the know-hows of Phishing and Spoofing attacks. This webinar will give insights to security professionals on the vulnerable areas which lead to the successful execution of phishing and malware attacks are carried out. The session has been crafted to showcase examples of extremely sophisticated malware and phishing attacks resulting in exposure to sensitive enterprise data. It will emphasize the measures you need to take for securing your remote workers against these attacks.


  • What is online Phishing and Spoofing?
  • What is Mobile Malware?
  • Types of Malware
  • Real World Examples
  • Prevention