The Perils of Passwords. Hello! I’m Joe Campbell Principal Security Architect Dell Software.

Slides:



Advertisements
Similar presentations
Managing A Secure Infrastructure – Tales From the Trenches November 6, 2003.
Advertisements

Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
How to take advantage of search engines for your local business.. THE LAST FRONTIER LOCAL and MOBILE SEARCH Take advantage with…
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Security and Risk Management. Who Am I Matthew Strahan from Content Security Principal Security Consultant I look young, but I’ve been doing this for.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Cloud Security Julian Lovelock VP, Product Marketing, HID Global.
InformationGraphics.Biz Case Study : FOX t.. Challenge The Create a graphic that explains an abstract software concept for FOX t’ s security vulnerabilities.
Microsoft ® Official Course Module 13 Implementing Windows Azure Active Directory.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
User Manager Pro Suite continued… All-in-One Security, Management & Reporting.
- NCSU project goals and requirements - Adoption Drivers - Current challenges and pain points - Identacor at NCSU - Identacor Features - NCSU Key Benefits.
Problems With Centralized Passwords Dartmouth College PKI Lab.
Adxstudio Portals Training
Chris Calderon – February 2016 MIS 534 Information Security Management.
Yahoo Help Phone Number Get Instant Help.
 Attempts to steal your identity since most people who use Facebook post personal information and click things without thinking about it.
1. Begin Quick Start 2. Administration 3. Good to Know 4. Slightly Technical 5. User Experience 6. You are ready to go !
Best Practices for Mobile Business Intelligence. So you’re thinking about going Mobile….  Who am I’m going to be providing the information too?  What.
Enabling the Modern Workstyle with Windows 10 & Azure Active Directory Venkatesh Gopalakrishnan 2016 Redmond Summit | Identity Without Boundaries May 25,
Alfresco and 2 Factor Authentication Ermanno Russo Developer at Zaizi.
of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently work away from their desks.***
Cyber security. Malicious Code Social Engineering Detect and prevent.
BuckeyePass Multi-Factor Authentication. 2 What is Multi-Factor Authentication? Adds a 2 nd layer of security Combines something you know with something.
Defense In Depth: Minimizing the Risk of SQL Injection
Digital Assistants – a brand’s best friend?
Implementing and Managing Azure Multi-factor Authentication
ArchPass Duo Presentation
2 Factor & Multi Factor Authentication
Multifactor Authentication
Cyber Safe – WGC Parents
What Do You Mean My Password Isn’t Enough?!?
Outline Basic concepts in computer security
Lesson Objectives Aims You should be able to:
System Access Authentication
AuthLite 2-Factor for Windows Administration
Federation made simple
Do you know who your employees are sharing their credentials with
Goodbye to Passwords.
ActivID Tap Authentication HID Global
Information Security.
Acquirly Review Generation Setup and Overview
Password Management Limit login attempts Encrypt your passwords
How to Protect Yourself from ID Theft and Social Engineering
Using AAD B2C for WordPress & Secure Deployment Scenario
My Settings allows a user to manage their Business Banking personal information and preferences, including: Contact information Username and Password Security.
WELCOME TO KUCOIN CUSTOMER SUPPORT NUMBER +1-(855) RELATED LINK-
Security Threats Haunting the E-Commerce Industry. How Can Security Testing Help?
Taewan kang, Kevin huangfu
Cloud Connect Seamlessly
First-time Login to Business Banking:
Office 365 Identity Management
Multifactor Authentication & First Time Login
Microsoft Ignite /20/2018 2:21 PM
Network Security Best Practices
Social Media and Networking: What it is & why it’s important
Multi-Factor Authentication
The main cause for that are the famous phishing attacks, in which the attacker directs users to a fake web page identical to another one and steals the.
Using Two Factor Authentication To Secure Users Alan P. Barber
TechEd /22/2019 9:22 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Drew Hunt Network Security Analyst Valley Medical Center
Protecting your data with Azure AD
Welcome to Liscio, our new client communication platform.
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Dark Web Domain Status Report
How to Reset a Forgotten Windows Live Hotmail Password? | Call
Oh no! They hacked my password!!!
NCSA Duo.
Presentation transcript:

The Perils of Passwords

Hello! I’m Joe Campbell Principal Security Architect Dell Software

So… what’s the problem? Just in case you didn’t know 1

3 out of 4 consumers use duplicate passwords, many of which have not been changed in five years or more Data from survey conducted by Telesign

40 percent of those surveyed say they had “a security incident” in the past year Data from survey conducted by Telesign

FUN FACTS! While you learn fun things about passwords, consider how we know these facts…

Top 10 Literary, Movie or TV passwords Swordfish From the movie Horse Feathers Caput Draconis Harry Potter and the Sorcerer’s Stone Alligator From the TV show Scrubs Actually the same code I have on my luggage… From the movie Spaceballs Open Sesame From the book One Thousand and One Nights ZXCVB From the movie Hackers Valley Forge From the movie National Treasure Z1ON0101 From the movie Matrix Reloaded Peek-A-Boo From the TV show Babylon 5 Joshua From the movie Wargames

Are you kidding me? 2,000, , ,843 password 211,659 Adobe123 *Data captured from the Adobe Hack

We all know what comes next

Let’s Talk Solutions There’s more than you think 2

Web Access Management More than a ‘user convenience’. SSO and WAM must be viewed by us as an essential link in the security chain Password Reduction Technologies Priviledged Access Management Often overlooked, priviledged user credentials are the hacker’s holy grail Multi-Factor When you finally see the light and know that passwords aren’t enough

Web Access Management This isn’t simply Single-Sign-On Apps are more and more web based Apps are mobile The security ‘glue’ is the IdP, the Identity Provider An identity provider can eliminate the biggest risks of password proliferation

Web Access Management Why do we care? Complete control from a single dashboard Secure access to web applications Secure access to web services Audit all authentication attempts (good or bad) Audit all application access attempts You can secure an application that doesn’t have security

Privileged Accounts Privileged Accounts are the accounts that are used to get access to sensitive information AD Administrator Domain Admin DNS Admin SQL Database SA Your Bank User ID and Password Having access to these credentials is a blessing and a curse “Please don’t take away my SA access!!!” “Please take away my SA access!!!”

Privileged Accounts Why do we care? User account credentials cannot be comprised An admin can’t have the credentials beaten out of them!

Multi-Factor AuthN You are welcome to my Google Credentials: User ID: Password: EyeLoveMonkeys2! Multifactor authentication includes: Something you know, something you have, something you are Passwords are compromised all the time Latent password fingerprints are left in strange places

Multi-Factor AuthN Why do we care? Kim Jong-Un may have your password, but he doesn’t have your phone. Multi-factor is easy (don’t forget to leverage a risk engine!) Soft Tokens: Mobile Phone, Windows, Java Hard Tokens: Yubikey, OATH Compliant device Text Messaging Generation A simple Swipe? To put it simply… nearly all recent breaches would have stopped dead in their tracks with 2FA enabled somewhere.

Face it… you must do something

Are you the ‘Department of No’ ? 1. Executive/Director sponsorship 2. Focus on the people 3. Be nimble and promote intelligent change 4. Become the ‘Department of Yes’

You can reach me here: