Events

Join us at industry events to meet our experts and learn about mobile security, latest on threat hunting and AI

May 6-8

CYBERUK 2025

iVerify is proud to sponsor CYBERUK 2025 — the UK government's flagship cyber security event.

Join us in Birmingham for our spotlight talk "From Forensics to Real-Time Telemetry: The Shift in Mobile Threat Detection" We’ll explore how organizations are moving beyond reactive analysis toward proactive, real-time mobile threat detection — enabling faster, smarter responses in today’s high-risk environment.

Don’t miss this opportunity to connect and learn about our mission to make mobile security stronger and more accessible for everyone in the enterprise.

Past Event

RSA 2025

Recharge, network, and unwind at the iVerify Reboot Lounge, a RSA Conference 2025. Join us for engaging conversations, 1:1 meetings, demos and a space to connect with top cybersecurity professionals in a relaxed setting.

  • Scan your phone for spyware and malware

  • Meet with our founders and mobile experts

  • Watch a demo of our Mobile EDR solution

  • Recharge with "safe" OEM chargers

  • Refresh with tasty snacks and cool swag

Monday - Wednesday, April 28rd - 30th  
Space is limited—Schedule time now to secure your spot!

Past Event

SXSW 2025| Break the Bot: Red-Teaming Large Language Models

Numa Dhamani and Maggie Engler, co-authors of Introduction to Generative AI, talk about how red-teaming has long been a crucial component of a robust security toolkit for software systems. Now, companies developing large language models (LLMs) and other GenAI products are increasingly applying the technique to model outputs, as a means of uncovering harmful content that generative models may produce. Thus, developers can identify and mitigate issues before they occur in production.In this session,

Past Event

NULLCON | Predator Malware: Trust Broken at the Core

In this talk, Matthias Frielingsdorf, VP of Research & Development at iVerify, will break down Predator's architecture, including the distinct features introduced in its second iteration. We'll explore its complex infection chain, evasive techniques and the the differences between the first and second iteration. 

By examining this threat in detail, we aim to not only expose the methods behind Predator but also to equip cybersecurity professionals with knowledge to better anticipate and counter such malware in the future.

Let’s Meet

Let us know if you will be at one of these events, we will connect you with one of our mobile security experts to share how iVerify protects mobile fleets against the serious risks of advanced zero-day vulnerabilities, advanced malware, zero-click spyware and mobile phishing threats.