Navigate Mobile Security Threats with Paul Troisi CEO of Troy Mobility ETMA Tech Talk
Tue Feb 03 2026
Navigate Mobile Security Threats with Paul Troisi CEO of Troy Mobility ETMA Tech Talk Podcast
Enterprise mobility security rarely collapses in a single moment.
It weakens over time.
One device slips outside policy.
Smartphones receive less security and controls than corporate laptops.
On this ETMA Tech Talk Podcast, Paul Troisi joins host Joe Basili to discuss how mobile devices became the most underestimated risk inside most organizations, even as they sit at the center of daily work. The discussion stays practical, occasionally uncomfortable, and firmly rooted in experience earned across hundreds of deployments.
The Most Used Endpoint in the Enterprise Gets the Least Attention
Mobile devices touch nearly every enterprise system that matters: Email, collaboration platforms, CRM, financial applications, HR systems, cloud services and more.
Many organizations continue to secure smartphones differently than laptops.
Enterprises invest in endpoint detection, VPNs, identity controls, and layered defenses for traditional endpoints. Smartphones often operate with limited visibility, fragmented controls, and inconsistent enforcement.
From a threat actor’s perspective, the weakest point in the environment is obvious.
This is why Paul emphasizes device parity. If mobile devices access the same corporate data and cloud services as laptops, they should be governed and protected at the same level.
Not similar. The same.
What Mature Mobility Programs Actually Look Like
The strongest mobility programs are disciplined and predictable.
Across more than 1,500 mobile security implementations, Troy Mobility has seen the same traits in high-performing environments. Clear lifecycle management. Identity enforcement that holds up under pressure.
AI Has Shifted the Threat Curve
Threat actors use AI to personalize phishing, smishing, and executive impersonation attacks with increasing precision. Mobile devices are an attractive entry point because controls are often weaker and behavioral signals are harder to monitor.
Messages look routine. Requests sound credible. Timing feels deliberate. These attacks bypass legacy controls by blending into normal behavior. Paul sees organizations struggle not because they ignore security, but because existing tools were not designed for this level of personalization.
Why Cost Arguments Miss the Point
Security conversations often stall around budget. Paul challenges this thinking.
The cost of platforms is visible and measurable. The cost of a mobile-driven breach is not. Reputational damage, regulatory exposure, executive accountability, and operational disruption rarely appear on procurement spreadsheets until the damage is done.
Price still matters. Fit matters more.
BYOD Is No Longer the Real Debate
Modern mobile platforms enforce strict privacy boundaries regardless of ownership. MDM tools cannot read personal photos, messages, or call logs. That misconception persists and continues to slow adoption.
A Founder’s Perspective Shaped by Timing
Paul’s entry into mobility security started during the 2008 recession. No funding. No customers. Four young children at home. Paul credits his success to constant learning.
Why This Conversation Matters Now
Enterprise mobility sits at the intersection of security, finance, operations, and productivity.
For leaders responsible for technology management, cybersecurity, FinOps, procurement, and enterprise risk, the conversation is worth the time.
🎥 YouTube https://youtu.be/vK8hR9CIuoA
🎧 Podcast
Spotify: https://open.spotify.com/show/39v180fktYhRSbcq3hk9rnApple Podcasts: https://podcasts.apple.com/us/podcast/etma-tech-talk-podcast/id1822837171iHeartRadio: https://www.iheart.com/podcast/269-etma-tech-talk-podcast-282837991/Connect:
Paul Troisi linkedin.com/in/paul-troisi
Troy Mobility https://www.troymobility.com
📣 Brought to you by: https://www.etma.org
More
Navigate Mobile Security Threats with Paul Troisi CEO of Troy Mobility ETMA Tech Talk Podcast Enterprise mobility security rarely collapses in a single moment. It weakens over time. One device slips outside policy. Smartphones receive less security and controls than corporate laptops. On this ETMA Tech Talk Podcast, Paul Troisi joins host Joe Basili to discuss how mobile devices became the most underestimated risk inside most organizations, even as they sit at the center of daily work. The discussion stays practical, occasionally uncomfortable, and firmly rooted in experience earned across hundreds of deployments. The Most Used Endpoint in the Enterprise Gets the Least Attention Mobile devices touch nearly every enterprise system that matters: Email, collaboration platforms, CRM, financial applications, HR systems, cloud services and more. Many organizations continue to secure smartphones differently than laptops. Enterprises invest in endpoint detection, VPNs, identity controls, and layered defenses for traditional endpoints. Smartphones often operate with limited visibility, fragmented controls, and inconsistent enforcement. From a threat actor’s perspective, the weakest point in the environment is obvious. This is why Paul emphasizes device parity. If mobile devices access the same corporate data and cloud services as laptops, they should be governed and protected at the same level. Not similar. The same. What Mature Mobility Programs Actually Look Like The strongest mobility programs are disciplined and predictable. Across more than 1,500 mobile security implementations, Troy Mobility has seen the same traits in high-performing environments. Clear lifecycle management. Identity enforcement that holds up under pressure. AI Has Shifted the Threat Curve Threat actors use AI to personalize phishing, smishing, and executive impersonation attacks with increasing precision. Mobile devices are an attractive entry point because controls are often weaker and behavioral signals are harder to monitor. Messages look routine. Requests sound credible. Timing feels deliberate. These attacks bypass legacy controls by blending into normal behavior. Paul sees organizations struggle not because they ignore security, but because existing tools were not designed for this level of personalization. Why Cost Arguments Miss the Point Security conversations often stall around budget. Paul challenges this thinking. The cost of platforms is visible and measurable. The cost of a mobile-driven breach is not. Reputational damage, regulatory exposure, executive accountability, and operational disruption rarely appear on procurement spreadsheets until the damage is done. Price still matters. Fit matters more. BYOD Is No Longer the Real Debate Modern mobile platforms enforce strict privacy boundaries regardless of ownership. MDM tools cannot read personal photos, messages, or call logs. That misconception persists and continues to slow adoption. A Founder’s Perspective Shaped by Timing Paul’s entry into mobility security started during the 2008 recession. No funding. No customers. Four young children at home. Paul credits his success to constant learning. Why This Conversation Matters Now Enterprise mobility sits at the intersection of security, finance, operations, and productivity. For leaders responsible for technology management, cybersecurity, FinOps, procurement, and enterprise risk, the conversation is worth the time. 🎥 YouTube https://youtu.be/vK8hR9CIuoA 🎧 Podcast Spotify: https://open.spotify.com/show/39v180fktYhRSbcq3hk9rnApple Podcasts: https://podcasts.apple.com/us/podcast/etma-tech-talk-podcast/id1822837171iHeartRadio: https://www.iheart.com/podcast/269-etma-tech-talk-podcast-282837991/Connect: Paul Troisi linkedin.com/in/paul-troisi Troy Mobility https://www.troymobility.com 📣 Brought to you by: https://www.etma.org