Loading Events

Is your enterprise MFA solution effective?

Home » Events » Is your enterprise MFA solution effective?

  • This event has passed so registration is closed.



Date and Time

June 9, 2021 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference


Irene Fisher


Lisa O'Connell


Is your enterprise MFA solution effective?

MFA is critical to reducing risk in the enterprise. But not all MFA factors are equally effective. Join us as we discuss how attackers are taking advantage of weaknesses in the most popular MFA factor. We will review a strong authentication factor based on the FIDO2 standards, which presents its own challenges in balancing security against cost and productivity. Finally, we will introduce a modern authentication factor and service tailored to your business model and needs that delivers a secure, cost effective and low friction solution.

What you will learn:

  • Why the most popular MFA factor should worry a security professional
  • The advantages of a strong authentication factor based on FIDO2
  • The Risk Management challenge: security vs cost & productivity
  • How to solve the Risk Management challenge with a modern authentication factor


Lee Neely – Information Assurance APL, LLNL

Lee Neely is a senior IT and security professional at LLNL with over 30 years of extensive experience with a wide variety of technology and applications from point implementations to enterprise solutions. He teaches cyber security courses, and holds several security certifications including GMOB, GPEN, GWAPT, GAWN, GPYC, GEVA, CISSP, CISA, CISM and CRISC. He is a current ISSA International Board Member and former ISSA International Director, Member of the SANS NewsBites Editorial Board, SANS Analyst, and Security Weekly podcast host. You can keep up with Lee @lelandneely

See Lee Neely‘s full profile.


Dan Hall – Principal Product Manager, Akamai

Dan Hall is a Principal Product Manager for Akamai's access and security products, helping to build solutions that enable customers to successfully make their Zero Trust transformations. Dan has extensive experience as a product manager, having managed products for data access over cable, DSL networking, MPLS services, and NGFWs and SWGs for network security. Dan has helped the largest carriers and enterprise customers in the world successfully deploy the latest technologies in networking and network security.

See Dan Hall‘s full profile.

Nick Espinosa – CIO, Security Fanatics & BSSi2 LLC

An expert in cybersecurity and network infrastructure, Nick Espinosa has consulted with clients ranging from small businesses up to the Fortune 100 level. Nick founded Windy City Networks, Inc in 1998 at age 19 and was acquired in 2013. In 2015 Security Fanatics, a Cybersecurity/Cyberwarfare outfit dedicated to designing custom Cyberdefense strategies for medium to enterprise corporations, was launched. A nationally recognized speaker, member of the Forbes Technology Council, TEDx Speaker, regular columnist for Forbes, award winning co-author of a bestselling book “Easy Prey”, host of “The Deep Dive” nationally syndicated radio show, on the Board of Advisors for Roosevelt University's College of Arts and Sciences as well as their Center for Cyber and Information Security and is the Official Spokesperson for the COVID-19 Cyber Threat Coalition. Nick is known as an industry thought leader and sought after for his advice on the future of technology and how it will impact every day businesses and consumers.

See Nick Espinosa‘s full profile.

Ankur Ahuja – CISO, Fareportal

– Global Head of Information Security @ Fareportal covering all brands including CheapOair, OneTravel
– Manage Security teams across US, India and Ukraine
– Ensures organization is well protected from insider and cyber threats

See Ankur Ahuja‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top