Password Security Benchmarks: Making Password Managers a Tangible Metric

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Security risks surrounding password use in the enterprise have posed various challenges for IT leaders in organizations of all sizes for some time. In recent years, more and more businesses have looked to password managers to improve their password hygiene.

However, with budgets tight and pressures mounting on IT security leaders to get results, how do you show the improvement password managers can bring in a measurable way?

Whether you need to prove security enhancements, justify ROI or ensure executive buy-in, you need to learn how to make passwords managers a tangible metric.

In this webinar, industry experts will outline a password benchmark for your business and explore how to leverage it for the betterment of your organization.

Key takeaways:

  • How and why password managers can benefit your organization
  • How to measure and quantify password security improvements in your business
  • Insights into key findings from the Global Password Security Report


Gerald Beuchelt

Chief Information Security Officer, LogMeIn

    Barry  McMahon

    LastPass by LogMeIn

      Stephen Pritchard

      Freelance Writer, Infosecurity Magazine

        Gary Williams

        IT Infrastructure manager

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.