Inadequate authentication measures leave your digital identity vulnerable to cybercriminals. Tools such as multi-factor authentication, biometrics, passwords, PINs, and tokens are all more vulnerable to attacks and social engineering than you realize. And one wrong move leaves you and your organization powerless in the face of cyber threats. 

In this webcast, Roger Grimes, Data-Driven Defense Evangelist for KnowBe4, takes you through the ins and outs of authentication hacking. He will share:

•  A deep dive into the authentication process and why strong authentication is vital to your organization's security

•  Detailed explanations of authentication vulnerabilities for biometrics, MFA, passwords, and more

•  Real-world examples of man-in-the-middle attacks, MFA bypasses, rogue recoveries, and others

•  How to empower your end-users to become your best last line of defense

Your digital identity is the gateway to your organization's most valuable assets. Watch this webcast to learn how to keep your fortress secure.

Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
speaker photo
Roger Grimes
Data-Driven Defense Evangelist, KnowBe4

Roger Grimes is a 30-year computer security consultant, instructor, holder of dozens of computer certifications and an award-winning author of 10 books and over 1,000 magazine articles on computer security. He has worked at some of the world’s largest computer security companies, including Foundstone, McAfee and Microsoft. Grimes holds a bachelor’s degree from Old Dominion University. He has been the weekly security columnist for InfoWorld and CSO magazines since 2005.

speaker photo
Tom Bechtold
Digital Event Director, SecureWorld
Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.