The #1 Threat: Weak or Stolen Credentials – Analyzing and Combating the Risk

Future Cyber Tech, Application Security & DevOps Theatre

Wed 18th Oct 11:40 to 12:10

The number one technique used by attackers in a data breach is leveraging weak or stolen credentials. To combat this technique, organizations are embracing methods to include multifactor authentication and improved access control for domain administrator accounts. Companies fall short in assessing their pre-attack risk and in failing to take into consideration non-administrator accounts and local accounts. Organizations must implement proactive measures to minimize risk of an attack. Once a breach occurs, it is too late. This talk will address techniques organizations should use to assess risk prior to an attack and
approaches to better defend the network from credential-based attacks.

What you will take away from this session

  • Once a breach occurs, it is too late
  • The number one technique used by attackers in a data breach is leveraging weak or stolen credentials
  • Organizations must implement proactive measures to minimize risk of an attack
  • Learn techniques to assess risk prior to an attack and approaches to better defend the network from credential-based attacks

Speakers

Photo Speaker Name Profile
David Aucsmith David Aucsmith View Profile
Top