With more than three decades of use, MFA is a proven method to reduce the risk of breaches due to stolen or weak credentials. While nearly any MFA method is an improvement over username and password alone, creative and resourceful attackers continue to expose weaknesses in legacy solutions such as token-based or telephony-based authentication. When considering or reviewing your secure access options, there are valuable lessons that can be learned from some of these real-world examples.
Join Duo Security’s Josh Green for a grounded discussion on how MFA methods have evolved, a dissection of several successful attacks, and how modern MFA solutions fare against the same threats.
Josh Green, Duo Security
Josh Green is the Solutions Engineer for Duo Security’s London office, providing pre-sales engineering support for organizations of all sizes. He works closely with everyone from CIOs, CISOs, IT Security, IT management and staff on product education, planning and deployment of Duo Security products. Josh has been working in the cybersecurity space for the past 7 years dealing with Identity Management, Vulnerability Management, and Authentication. He speaks 4 languages, and in his spare time, enjoys learning new ones.