Posted on
in Presentations
We will discuss failure modes of advanced authentication and show exploit bypasses of multifactor auth systems. From there, we will provide pragmatic means for defense of credential systems, including normalizing credential defense, baselines, credential reset engineering, and architecture of a "credential firewall" so that network firewalls aren't bypassed by unsafe credential practices.
Hackers & Threats Identity Risk Management & Governance
authentication hackers & threats identity management & governance password management practitioner perspectives
Topic
Hackers & Threats
Identity
Risk Management & Governance
Subtopic
authentication
hackers & threats
identity management & governance
password management
practitioner perspectives
Share With Your Community