Breaking the Multi-Factor Authentication Myth

How Hackers are Bypassing MFA with Astonishing Accuracy in Episode Four of Phish Stories

Featuring

  • SlashNext

Episode Four of Phish Stories

The Cybersecurity & Infrastructure Security Agency (CISA) issued a warning in early 2021 that hackers are using the cloud to bypass MFA. According to a recent Osterman study, 74% of security professionals from mid to large-sized organizations believe MFA is the most effective mitigation against credential stealing.

Hackers are abusing the trust in authenticated services that many organizations rely on heavily for protection. Understanding and preparing for how these silent but dangerous attacks are hacking into human vulnerabilities are imperative for protecting your organization.

Join SlashNext’s founder and cybersecurity expert, Atif Mushtaq, and CEO Patrick Harr to learn about the multitude of techniques hackers are using to bypassing MFA and explore real-life examples of how these attacks are challenges organizations.

  1. Scott D. Lowe

    Host Scott D. Lowe Partner & CEO Guest Speaker

  2. Patrick Harr

    Special Guest Patrick Harr CEO SlashNext

  3. Atif Mushtaq

    Special Guest Atif Mushtaq Founder & Chief Product Officer SlashNext

What You'll Learn

  1. How hackers are using the cloud, AI, and behavioral targeting to increasing success
  2. Latest MFA attacks that are targeting users now through compromised cloud infrastructure, rogue software, man-in-the-middle attacks, fake 2FA request, and security warnings
  3. Recommendations and resources for protecting your environment from MFA compromise