YoVDO

Why Some Multi-Factor Authentication Technology is Irresponsible

Offered By: LASCON via YouTube

Tags

LASCON Courses Multi-Factor Authentication Courses Biometrics Courses

Course Description

Overview

Explore an independent, critical assessment of multi-factor authentication technologies and methods in this 41-minute LASCON conference talk. Gain valuable insights into selecting the best authentication solution for your needs, with over 200 vendors in the market. Learn to identify suboptimal technologies to avoid and arm yourself with essential questions to ask vendors. Discover the importance of rejecting or requesting alternatives for problematic choices in multi-factor authentication products, including 2D fingerprints, QR codes, SMS OTP, and weak account recovery methods. Understand the growing disparity between NIST's definition of multi-factor authentication and newer vendor definitions. Delve into topics such as biometrics adoption, threat models, FIDO Alliance, and IoT predictions. Equip yourself with the knowledge to make informed decisions and contribute to the development of more secure authentication products and services.

Syllabus

Introduction
NIST definition
Why so many vendors
Biometrics adoption
Youre responsible
Biometrics
Threat Models
Dr Future
SMS OTP
Google Authenticator
FIDO Alliance
IOT
Predictions
What can you do


Taught by

LASCON

Related Courses

Comparing WAF and RASP - Why?
LASCON via YouTube
API Security - Is it the New Application Attack Surface and How to Secure at Enterprise Scale
LASCON via YouTube
Privacy Impact Assessments - How Much Privacy Is Enough?
LASCON via YouTube
Your Frontier Defense - Understanding Web Application Firewalls
LASCON via YouTube
Doing This One Crazy Thing Will Change Your AppSec Program Forever
LASCON via YouTube