Ruchira Pokhriyal

Cloud Developer-Security Specialist at Amazon Web Services (AWS) at Qualys #LeanInBreakingBarriers

Very passionate about learning the entire umbrella of Cybersecurity-there are so many fascinating domains and I’m always excited to gain some expertise in all the areas of security. A few that I’ve gotten an opportunity to work on so far: Cloud security, Web Application PenTesting.

You’d often hear and see me advocate for Diversity and Inclusion, Gender Parity, Women in STEM! These matters are really close to my heart & I believe in growing with my community, being supportive & giving back as much as I can!
I’m currently enjoying learning all about AWS Security Solutions as an Associate Cloud Developer with specialty in security at Amazon Web Services. Prior to joining AWS, I was working as a Web Application Penetration Tester at Synopsys Inc. and hence have a good knowledge of both breaking and securing applications!
I’ve graduated from The University of North Carolina at Charlotte, with a Master’s degree in Cybersecurity & my Other Educational qualifications include a Master's and a Bachelor's degree in Computer Science.
I’m an AccessData Certified Forensic Examiner (ACE V6) and my future prospects are to get the AWS associate and professional level certifications, bringing a change in the industry by empowering more women to stand for themselves & encouraging more male counterparts to become allies.

Follow Ruchira

All Sessions by Ruchira Pokhriyal

Day Oct 27 2021

Mobile Threats 101
Airmeet

We have embraced the advancement in technology by moving away from traditional wired devices and towards wireless technology. We carry technology in our bags and pockets -thanks to our cell phones and tablets that provide us with several computing features such as connectivity to the internet. It’s safe to say that the term “Computers” is no longer associated to just laptops and desktops anymore.
Through the increased use of corporate mobile apps, VPNs, hot spots etc. in the last few months, our dependencies on mobile applications and capabilities have increased drastically! But as mobile access has grown, so have mobile security threats. Mobile applications sometimes lack the detailed privacy controls of their PC counterparts. Unfortunately, many users do not recognize these security shortcomings, falling prey to botnets, malware, network exploits and social engineering attacks.
In this presentation, we’ll develop a robust understanding of the common mobile security threats and go over best practices and tips to secure our mobile devices & protect out data from bad actors.