Skip navigation
Industry Events

Webinar: End-User Authentication Security on the Internet

Did you miss our webinar featuring Mark Stanislav of Duo Security and Paul Roberts of The Security Ledger? No worries, we have a full recording of the webinar available for your viewing!

###View the video now.

Security for the People: End-User Authentication Security on the Internet
Free Webinar with Presenters from Duo Security and The Security Ledger

Despite the continued success by attackers to brute-force accounts, phish credentials, and otherwise impact the online security of consumers, a large portion of the sites and services consumers utilize still don't take authentication security seriously enough.

This presentation analyzes security expert Mark Stanislav's recent research into the state of end-user-facing authentication security as it relates to strong authentication, transport security, breach history, security transparency, and complementary browser security features.

This webinar covers the following issues:

  • About the current risks and realities surrounding authentication security
  • How organizations can protect consumer authentication and deploy relevant browser security features
  • Which consumer sites and services are most focused on ensuring the best defense against attackers
  • After registering you can either view the webinar now via the next webpage or via a link in an email that you will receive shortly.

Mark Stanislav, Security Researcher, Duo Security
Mark Stanislav is the Security Researcher for Duo Security, an Ann Arbor, Michigan-based startup focused on two-factor authentication and mobile security. With a career spanning over a decade, Mark has worked within small business, academia, startup, and corporate environments, primarily focused on Linux architecture, information security, and web application development. Mark has spoken nationally at over 70 events including RSA, ISSA, B-Sides, GrrCon, Infragard, and the Rochester Security Summit.

Mark's security research has been featured on websites including CSO Online, Security Ledger, and Slashdot. Additionally, Mark is an active participant of local and national security organizations including ISSA, Infragard, HTCIA, ArbSec, and MiSec.

Mark earned his Bachelor of Science Degree in Networking & IT Administration and his Master of Science Degree in Technology Studies, focused on Information Assurance, both from Eastern Michigan University. During his time at EMU, Mark built the curriculum for two courses focused on Linux administration and taught as an Adjunct Lecturer for two years. Mark holds CISSP, Security+, Linux+, and CCSK certifications.

Paul Roberts, Founder and Editor in Chief, The Security Ledger
Paul Roberts is the Founder and Editor in Chief of The Security Ledger, an independent security news website that explores the intersection of cyber security with the Internet of Things.

Paul is a seasoned reporter, editor and industry analyst with more than a decade of experience covering the information technology security space. His writing about cyber security has appeared in publications including MIT Technology Review, The Economist Intelligence Unit, CIO Magazine , ZDNet and Fortune Small Business. He has appeared on NPR's Marketplace Tech Report and The Oprah Show.

Prior to launching Security Ledger, Paul worked as a Senior Analyst in The 451 Group's Enterprise Security Practice. He has held positions as a senior writer and editor at noted industry publications including, and Ziff Davis's and The IDG News Service.

Paul lives outside Boston with his wife and three, spirited daughters. His hobbies include marathoning, swimming, gardening and local politics.

You might also be interested in a few of our other on-demand webinar videos, including:

Looking Beyond Layers: Why Authentication Security Matters Most
While traditional security lends itself to perimeter controls, defense in depth, threat intelligence, breaches are still occurring. In this presentation, we highlight a few examples of a new approach to security with authentication-focused solutions. Watch now >>

How to Strengthen the "Weakest Link" with Two-Factor Authentication
Learn more about the threats facing end-users of organizations as the perimeter of security continues to change, including a demo of how a Social-Engineer Toolkit (SET) can showcase a user-targeted attack. Find out how two-factor authentication empowers your users. Watch now >>

Check out all of our Security Resources including more webinars, infographics, guides and how-to’s.