T.E.N. Tech Talks
Not All MFA is Created Equal and Why Passwordless MFA is Better
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Jasson Casey
Chief Technology Officer
Beyond Identity
Biography
Patrick McBride
Chief Marketing Officer
Beyond Identity
Biography
Passwords are the most common attack vector and are a leading cause of data breaches. To counteract this weakness, companies have turned to multi-factor authentication (MFA) for a more robust alternative to basic passwords to increase assurance of a user’s identity at authentication. However, since most MFA solutions rely on passwords and other phishable factors for authentication: password-based MFA remains very vulnerable to password-related attacks such as phishing, man-in- the-middle attacks, SIM swaps, and more. The problems are only exacerbated due to the increased prevalence of SaaS apps, BYOD policies, and a historic rise in remote workforces as well as the dissipation of the security perimeter. Join us for an insightful conversation on how passwordless MFA can enable the verification of a user’s identity with confidence, provide comprehensive data protection and meet the new requirements of the modern workforce. We will also deep dive on the best practices on how a truly secure passwordless MFA is device-based that promotes adoption and compliance while reducing friction for users.
T.E.N. Tech Talks: Verifying Identity and Securing Code in the Wake of Software Supply Chain Attacks
Duration: 45 minutes
View this T.E.N. Tech Talks Video On Demand
Given the spate of software supply chain attacks, organizations need to do more to secure their code repository and control what code commits make it into their production branch. The notorious SolarWinds attack has helped highlight some of the broader and pervasive software supply chain vulnerabilities that impact most organizations today. Complex, shared code bases combined with organization productivity targets have gradually eroded trust and trustworthiness of our software development lifecycle. It’s crucial to verify the identity of the software developer committing code changes and prevent unauthorized users from injecting malicious code. To do so proactively or automatically, a Zero Trust philosophy can be applied to code signing to ensure code has not been compromised, among other techniques. Join our conversation where we will learn how code provenance and identity have become fundamental requirements; explore ways to track and record code changes; and implement code signing at the organizational level, without causing friction for developers.
Moderator:
Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent
Panelists:
The growing complexity of cloud, multi-cloud and hybrid compute combined with an evolving threat landscape has demonstrated how inadequate traditional network security is. The lack of both visibility and control of East-West traffic is turning more enterprises towards better solutions to protect critical assets. Zero Trust is suddenly the cyber strategy that everyone is talking about. From the recent Forrester Zero Trust Wave to every security vendor’s website, the words Zero Trust are popping up just about everywhere. Despite the attention, Zero Trust is still a strategy for most with very little reality to show for it. Deploying the strategy has proven to be easier said than done with many enterprises still in the planning stages. Join our conversation as we discuss operationalizing Zero Trust and how to make it a reality for financial service industry (FSI) systems.
Moderator: Panelists:
With hybrid workforces becoming the norm for many organizations, keeping business data safe everywhere it is used is crucial to enabling people to work anywhere. Enforcing the same policies consistently from the endpoint, through the network, and into both the web and cloud requires a new approach. Join our conversation where we will learn how new data-first SASE cloud security is safely boosting productivity while eliminating complexity and costs for distributed businesses and government agencies.
Moderator: Panelists:
Husnain Bajwa, Senior Manager, Global Sales Engineering, Beyond Identity
Joey Johnson, CISO, Premise Health
T.E.N. Tech Talks: Secure Critical Assets With Zero Trust Segmentation
Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent
Ron Isaacson, Field CTO, Illumio
Eric Schmidt, Information Security Officer, Eskenazi Health
T.E.N. Tech Talks: How Putting Data Protection First Makes Remote Workers More Productive
Marci McCarthy, CEO and President of T.E.N. and CEO and Chairman of ISE® Talent
Todd Beebe, Information Security Officer, Freeport LNG
Jim Fulton, Head of SASE/Zero Trust Solutions, Forcepoint
CONTACT T.E.N. TODAY
Interested in sponsoring a T.E.N. Tech Talks? Contact sales at sales@ten-inc.com or (404) 920-8582, ext 106