Beyond Passwords: Securing the Digital Age with MFA, 2FA, and Passwordless Authentication

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In the age of extensive cyber-attacks and data breaches, traditional password-based authentication is becoming increasingly inadequate.

Multi-factor authentication (MFA), two-factor authentication (2FA), and passwordless methods are the new gold standard for online security.

This panel discussion will delve into the intricacies of these technologies, exploring their strengths, weaknesses, and potential to revolutionize the way organizations approach the first line of security.

Join this session to learn:

  • The warnings are clear: How MFA failures lead to hacks and cyber-attacks 
  • What a passwordless future looks like and how you can adopt these solutions in your organization.
  • How to get customers and employees on board with your authentication efforts.

This session was part of Infosecurity Magazine's Online Summit Spring 2024 


Photo of Roger Grimes

Roger Grimes

Data-Driven Defense Evangelist, KnowBe4, KnowBe4

Photo of Raul Zeppenfeldt  Molina

Raul Zeppenfeldt Molina

Cybersecurity Expert, PA Consulting, PA Consulting

Photo of Camille Singleton

Camille Singleton

Manager, IBM X-Force Threat Intelligence, IBM Corporation

Photo of Gregory Vigroux

Gregory Vigroux

PKI/FIDO Product Line Manager, Thales, Thales

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Mimecast here: Please see the privacy policy for Censys here: Please see the privacy policy for Menlo Security here: Please see Infosecurity Magazine’s privacy policy for more information.