This document summarizes a presentation about malicious uses of Mobile Device Management (MDM) software. It describes how MDM can be used to manage devices but also exploited by attackers. It provides examples of techniques like using direct USB connections, websites, or email to deploy rogue MDM profiles that can steal credentials, intercept traffic, or install malicious apps. The presentation includes a demonstration of creating a fake wireless network and apps using an MDM profile. Defenses discussed include only adding devices to your legitimate MDM and not connecting devices to untrusted USB ports.