In the rush to implement shiny new MFA solutions, have we missed the boat? This session will focus on how MFA systems are bypassed, and backdoors utilized to neuter advanced auth, with a pragmatic approach on fixing the problem. We must armor up!
Security Strategy & Architecture Identity
password management identity management & governance exploit of vulnerability authentication access control
Share With Your Community