Presenter Photo

In even the smallest of today’s IT enterprises, there are simply far too many passwords for management (securing, rotating, etc.) to be left to humans alone. Join Security MVP, Paula Januszkiewicz, as she walks you through best practices for managing passwords, plus demo where passwords are stored and how to decrypt them. Also learn:

  • Where the technology weaknesses are, and how to take passwords from the Operating System to perform several operations
  • The unexpected places your passwords reside, and how to mitigate pass-the-hash attacks
  • How password attacks are performed and the typical paths for credentials to leak

This webinar will be heavily demo-focused, and is one you won’t want to miss!