When MFA Goes Wrong, And How To Set It Right
In this webinar, you will learn:
- Why SIM-swap attacks and insecure multi-factor authentication (MFA) methods can increase the risk of credential theft
- How attackers leveraged these security gaps in real-world breach examples
- Why device-specific authentication methods like Push and U2F close these gaps and provide better defense
With more than three decades of use, MFA is a proven method to reduce the risk of breaches due to stolen or weak credentials. While nearly any MFA method is an improvement over username and password alone, creative and resourceful attackers continue to expose weaknesses in legacy solutions such as token-based or telephony-based authentication. When considering or reviewing your secure access options, there are valuable lessons that can be learned from some of these real-world examples.
Join Duo Security for a grounded discussion on how MFA methods have evolved, a dissection of several successful attacks, and how modern MFA solutions fare against the same threats.
Presenter Info
Zoe Lindsay, Duo Security, Security Strategist
Zoe Lindsey is a Security Strategist and an early member of the Duo team, joining Duo in 2012 with a background in medical and cellular technology. In her time at Duo, she has advised businesses and organizations of every size on strong security policy and unified access security solutions, and for the last two years has shared best practices and recommendations at events and discussion panels including the 2018 RSA Conference in San Francisco.