Cybersecurity Specialist & Researcher Shift Everywhere, Sweden
Multi-factor authentication (MFA) is often regarded as a security silver bullet. However, over a million bypass attacks occur every month, many successful. Is your cloud infrastructure protected? This session reveals how real-world MFA bypass attacks, such as fatigue attacks, session hijacking, and adversary-in-the-middle (AiTM), compromise organizations today. Through live demonstrations, we will explore the weaknesses in MFA implementations and discuss why relying solely on MFA creates a false sense of security. More importantly, you will learn how to enhance your organization’s defenses by employing best practices and strategies. Packed with actionable recommendations, this presentation will assist organizations in mitigating evolving threats and building a more resilient security posture. Don’t just implement MFA – secure it!
Learning Objectives:
Identify common MFA bypass attacks and understand their impact on organizations.
Evaluate the weaknesses in traditional MFA implementations and assess why relying on MFA alone creates a false sense of security.
Implement organization-wide strategies to strengthen authentication security and employee awareness initiatives.