1. Moscone West 2005

Mobile authenticator apps have become the overwhelming favorite of organizations to supposedly improve the integrity of digital identities. Unfortunately, most organizations have not paid attention to the importance of mobile device hygiene to really assure the integrity of those authenticator applications. Come see a demo of how easy it is to compromise mobile authenticator apps.

Pre-Requisites: Understanding of mobile operating system basics, knowledge of how MFA systems work.

Download pdf