Passwords and Authentication Bootcamp
If someone uses employee credentials to access your building or computer network, it could quickly become a disaster. Similarly, no employee wants some thief masquerading as them when they commit crimes. Proper authentication is important to everyone, but few really understand the risks and weaknesses of the systems they use. The purpose of this session is to describe the most common authentication methods, the risks of each, and countermeasures to handle those risks. Included are:
As always, you have two options: Hire me to teach your/your family/your company or learn right here, right now.
Ready to go?
If you'd like to discuss the seminar for use with company security days, private events, conferences, etc., please click here.
Supporting Materials
- Speaker Biography (PDF format)
- Handout (400K PDF)
Learn More First
Other than my dashing good looks and lightning charisma, you can get a great deal of the same information for free right here on my website. Job number one is making us all safer after all:
As this is my newest talk, I'm still creating the web version of this information. In the meantime, here is the outline for the talk.
Talk Outline
Subject to change without notification of course.- Biometrics – Voiceprint, facial recognition, fingerprint, and veinscans
- RFID – Electronic wireless identification
- Keys – Standard, physical keys
- Passwords – Computer passwords