Multifactored Auth Bypass: How to Armor Up

Posted on in Presentations

In the rush to implement shiny new MFA solutions, have we missed the boat? This session will focus on how MFA systems are bypassed, and backdoors utilized to neuter advanced auth, with a pragmatic approach on fixing the problem. We must armor up!

Dan Houser


Security Leader and Strategist, Trogdor Heavy Industries, LLC

Security Strategy & Architecture Identity

password management identity management & governance exploit of vulnerability authentication access control



Share With Your Community