Morning Keynote with root9B: The #1 Threat: Weak or Stolen Credentials – Analyzing and Combating the Risk.

No ratings

Presented at CyberSummitUSA 2017 by

The number one technique used by attackers in a data breach is leveraging weak or stolen credentials. To combat this technique, organizations are embracing methods to include multi- factor authentication and improved access control for domain administrator accounts. Companies fall short in assessing their pre-attack risk and in failing to take into consideration non-administrator accounts and local accounts. Organizations must implement proactive measures to minimize risk of an attack. Once a breach occurs, it is too late. This talk will address techniques organizations should use to assess risk prior to an attack and approaches to better defend the network from credential-based attacks.