Highlights

How does the mobile threat landscape look like
Solution to address threats
How to build a mobile security strategy