One of the most common identity security controls recommended is to implement MFA for at least those with access to valuable data…if not for absolutely everyone in the organization.
However, MFA most definitely isn’t a silver bullet. From simple social engineering methods like MFA prompt bombing or proxied logons – to advanced techniques designed to bypass MFA entirely – threat actors are finding ways to leverage compromised credentials despite organizations having MFA in place.
So, how is MFA being bypassed and what can you do about it?
In this webinar, we explore MFA’s promises, assumptions, and recent failings. Topics covered, include:
- A look at MFA architecture and various practical ways MFA is implemented today
- Different ways attackers bypass or avoid MFA protection
- Controls to gain better visibility into attacker authentication
- Various ways to improve the state of security around MFA
- And more