Authentication Security: Crafting a Bulletproof Password Reset Process

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In today's fast-paced business environment, employees forgetting passwords or becoming locked out of devices is a headache for both users and IT teams alike. In addition, cyber-attackers are increasingly using the password reset process to gain unauthorized access to organizations’ network.

This webinar will highlight the common methods used by attackers to gain access to employees’ accounts, and the scale of the damage caused by these compromises.

The panellists will then share insights how to strengthen your password reset process to keep your data secure and free up your IT team to focus on more pressing matters. They will also highlight the importance of regular password vulnerability audits and how to protect your organization when credentials are compromised.

In this session you will learn:

  • An understanding of the current state of password security
  • How to create a password reset process that is secure, efficient and user-friendly
  • How to implement a rounded password security strategy 

Speakers

James Coker

Deputy Editor, Infosecurity Magazine

Darren  James

Senior Product Manager, Specops

Sam Lascelles

digital trust and cyber security expert , PA Consulting

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Specops's privacy policy here: https://specopssoft.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for additional information.