The Pesky Password Problem: Battle of the Red and Blue Team featuring Kevin Mitnick [LIVE WEBINAR]



What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods?

For decades, end-users have born the brunt of the password tyranny, a result of the IT industries’ inability to engineer secure systems. Password complexity, length, and rotation requirements are the bane of your end-user experience, helpdesk and literally the cause of thousands of data breaches.

In a recent quest to improve, NIST (the National Institute for Standards and Technology) has been looking at the problem from several angles and updated their guidance related to authentication systems and password composition. The resultant advice and implications were shocking for some and a relief to others.

PeskyWebinar-Social 

In this unique webinar you will learn about the recent NIST controversy and related password cracking problems. The “combatants” will be on the one side KnowBe4's Chief Hacking Officer, Kevin Mitnick with decades of first-hand “red-side” penetration testing experience, and on the other side Roger Grimes, KnowBe4's Data-Driven Defense Evangelist with decades of experience on the blue team. They will provide an in-the-trenches view of authentication hacking so that you get some insights about the truth of the effectiveness of passwords, various password management guidelines, and even stronger authentication systems using multiple factors. The referee will be Perry Carpenter, KnowBe4's Chief Evangelist and Strategy Officer.

Save My Spot!

 Don't like to click on redirected buttons? Copy and paste this link into your browser: 

https://event.on24.com/wcc/r/1856107/295DE6CAB72FFD67B1323DDF19759750?partnerref=Blog

 


Return To KnowBe4 Security Blog

Topics: passwords

Subscribe To Our Blog


BP future Direction of Security Awareness Training On-Demand Webinar

Recent Posts




Get the latest about social engineering

Subscribe to CyberheistNews