How to Strengthen the \Weakest Link" with Two-Factor Authentication"

  • Webcast Aired Wednesday, 05 Mar 2014 1:00PM EST (05 Mar 2014 18:00 UTC)
  • Speakers: Mark Stanislav, David Kennedy

Within the information security community, the users of technology are often considered to be the \weakest link" in an organization's chain of security controls. Through manipulation of a user's actions, an attacker can often gain control over systems and data simply by convincing a user that the task they are performing is safe and well-advised instead of the reality which is much more dire. As the perimeter of security continues to change, user-targeted attacks are becoming more prevalent and effective. With increasing usage of cloud solutions, attackers are more determined than ever to breach the resources of organizations by tricking end users into providing access to those accounts through phishing campaigns and other social engineering avenues.

In this web cast, Dave Kennedy (creator of the Social-Engineer Toolkit [SET]) and Mark Stanislav (Security Evangelist at Duo Security) will explain the threat facing end-users of organizations and provide insight into how modern two-factor authentication can help mitigate the associated risks. This presentation will feature a demonstration of SET to showcase the capabilities of a criminal executing a user-targeted attack and how Duo Security's technology is able to put power back into the literal hands of a user to protect the organization from a compromise.