Important Things You Need to Know about Storing Your Identity

Closed captioning will be available in English and Japanese for all keynotes and RSAC track sessions.
Please note: All times are in SGT.
REGISTER NOW
  1. Moscone West

What about places where credentials are stored? The technology weaknesses in credential security and specific misused actions will be demonstrated within the operating system. You will learn the unexpected places your passwords reside, how the password attacks are performed, the typical paths where credentials can be leaked and how to prevent these by implementing various solutions.

Learning Objectives:
1: Learn the technology weaknesses in credential security.
2: Learn the unexpected places your passwords reside, how the password attacks are performed.
3: Learn typical paths where credentials can be leaked and how to prevent those.

Pre-Requisites:
They should have a good hands-on experience in the IT department; at least eight years in the field is recommended.

Download pdf
Participants: