Loading Events
ISSA Thought Leadership Series

Passwordless Authentication

Home » Events » Passwordless Authentication

  • This event has passed so registration is closed.

Sponsor

Interested in getting your message in front of a targeted audience? Click on the link to explore sponsorship opportunities.

Details

Presentation Slides

Download the Presentation Slides

Date and Time

June 12, 2019 @ 1:00 pm - 2:00 pm EDT

Event Category

Web Conference

Event Type

ISSA Thought Leadership Series

Event Tags

Authentication, Password, Password Management

Organizer

Candice Benson

Contact

Lisa O'Connell

Overview

Why passwords are a thin illusion of protection and what to do about it. Passwords have become nothing more than a thin illusion of protection. Human nature and human error are the weakest links in protecting organizations from cyberattacks and data breaches. Users choose poor passwords and then re-use them across multiple applications and systems, leaving them vulnerable to phishing and social engineering by bad actors. For years, users have been encouraged to create complex passwords and change them frequently.

It is time to remove human error from the equation.

The adoption of passwordless authentication protects against phishing attempts and minimizes the threat of stolen credentials. Passwordless technology generally combines: Multi-layered risk analysis that evaluates location, devices, access rights and typing sequences; Intricate yet convenient 2FA/MFA methods; Biometrics and hardware authentication keys

Learn how passwordless authentication works and how it can help you increase security while reducing friction for your users.

Moderator

Dipto Chakravarty – Chairman of Security COE, IoT Community

Dipto Chakravarty is the author of three best-selling books on computer architecture and security from McGraw-Hill and Wiley that have been translated in five languages. He has 11 patents to his credit in AI, security and cloud, holds a M.S in Computer Science from U. of Maryland, GMP from Harvard Business School, and EMBA from Wharton School U. Penn. He is currently the Chairman of Security, Privacy and Trust COE for IoT Community, and board member at RANK Software.

See Dipto Chakravarty‘s full profile.

Speaker/s

Stephen Cox – Vice President and Chief Security Architect, SecureAuth

Stephen Cox is a technology veteran with nearly 20 years in the IT industry, including more than 10 years leading cybersecurity software development teams. A key player in some of the most influential IT security firms in the world, he is recognized as an expert in identity, network and endpoint threat detection, as well as an accomplished software architect.

As Vice President and Chief Security Architect at SecureAuth, Stephen is helps drive the strategy, vision and development for the company’s products and solutions. Prior to SecureAuth, Stephen worked at FireEye/Mandiant, RSA, VeriSign, Northrop Grumman and America Online. He holds a Master of Science in Software Engineering and a Bachelor of Science in Integrative Studies, both from George Mason University.

See Stephen Cox‘s full profile.

Mike McKinzie – Solutions Advisor, Swivel Secure

Mike McKinzie is a Solutions Advisor with Swivel Secure, a leading provider of 2FA/MFA solutions. Prior to joining Swivel Secure, Mike operated a boutique Security practice focused on Cyber Security serving Fortune 1000 companies. In addition, Mike has worked in Security Operations with a prominent Casino operator in Las Vegas, as a Systems Engineer with PGP, taught an Information Security course at Cal State, Fullerton and held various technical and security positions with a nationwide accounting firm. He holds a B.A from UC Irvine, earned his CISSP designation and is an active member of ISSA, Infragard and the ISF

See Mike McKinzie‘s full profile.

ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.

Scroll to Top