Friday, May 20, 2022 | 10:30 - 1:30 PM EDT
Welcome & Opening Remarks
Chris Dale, SANS Instructor & Subject Matter Expert
Street Cred: Increasing Trust in Authentication
Good security gets out of the way of users while getting in the way of adversaries. Passwords fail on both accounts. Users feel the pain of adhering to complex password policies. Adversaries simply copy, break, or brute-force their way in. Why, then, have we spent decades with passwords as the primary factor for authentication? The industry needs to trust passwordless authentication. Adversaries and then criminals have circumvented our authentication controls for decades. From the very first theft of cleartext passwords to the very latest bypass of a second-factor, time and again improvements in defenses are met with improved attacks. What holds us back from getting rid of passwords? Trust. In this session, we will propose a framework of technical controls to ensure only trusted sessions authenticate, regardless of faults or failures in any one factor. We will share a path forward for increasing trust in passwordless authentication.
J Wolfgang Goerlich, Advisory CISO, Cisco Secure
PAM Back to Basics
With so many high-profile breaches accomplished through compromising passwords on privileged accounts, PAM is a top priority for organizations of all sizes (Gartner puts it at the top of the security list for two years running). Join Thycotic’s Chief Security Scientist Joseph Carson, as he takes you on a brief journey through the PAM lifecycle to get you quickly up to speed and understand the PAM matrix of all the different types of privileged accounts that exist across all your different IT domains, often referred to as your privileged account attack surface.
Joseph Carson, Chief Security Scientist & Advisory CISO, Delinea
The Psychology of P@ssw0rds
The truth is: passwords are very likely to stay with us till the end of times. For the very same reason why one may still find Windows XP machines running critical DOS applications - legacy systems. Systems which maintenance is bravely passed from one generation to the next, along with the secrets stored in plain text files in long forgotten directories usually called "Desktop" or "My Documents". Not to mention hundreds of thousands of network devices, custom services and related protocols, security cameras and control systems, all of which will not accept any other authentication mechanism.
So what can be done? In order to strengthen our organizations' defense it is crucial to understand how passwords are being created, what are the most common tricks for bypassing policies and how mechanisms for weak credentials discovery can be improved. Is there any relationship between the native language being used in a password and its complexity? Does left hand as the dominant one have impact on the combinations being used? How much harm can a single file consisting of one hundred lines can actually do? During this session we will discuss the results of an on-going, years long journey of building the smallest and the most effective password dictionary.
Robert Pogorzelski, Penetration Tester, River Security
Best Practices for Using Customer Identity Solutions to Stand Up Against Security Attacks
Customer Identity solutions are cornerstones of protecting our connected world, ensuring that only authorized users - employers, contractors, partners, and customers - can access the resources they need. Security attacks are on the rise and we analyze how and why these identity attacks are able to penetrate. Today we will share best practices around threat mitigation that we see on our platform.
Nabeel Saeed, Senior Product Manager, Okta
Wrap-UpChris Dale, SANS Instructor & Subject Matter Expert