1. Online

We will discuss failure modes of advanced authentication and show exploit bypasses of multifactor auth systems. From there, we will provide pragmatic means for defense of credential systems, including normalizing credential defense, baselines, credential reset engineering, and architecture of a "credential firewall" so that network firewalls aren't bypassed by unsafe credential practices.

  • Dan Houser