1. Moscone West

You must break free of password vulns but the reality is legacy auth woven into the org in various stages of technical debt. Large enterprises may close 95% of the holes while attackers find the remaining 5%. This session will describe the dangers and the surprises of Microsoft’s journey toward 100% remediation with practical guidance to help with yours.

Pre-Requisites: General understanding of core IAM concepts, logging, analytics, and application of MFA concepts.

Participants: