SlideShare a Scribd company logo
7
Most read
12
Most read
13
Most read
#mfa_uncovered
Multifactor Authentication
Ronald Isherwood
Kevin Miller
@virtualfat
@millzee69
Who? – Ronnie Isherwood
Technology evangelist, presenter, author & editor
Chairman (BCS Jersey)
Founder (Jersey Techfair)
#mfa_uncovered
Who? – Kevin Miller
Founder / Director
Consultant
#mfa_uncovered
Agenda
• Why do we need authentication?
• A brief history of authentication
• What is Multi-factor (MFA) authentication?
• Common authentication risks
• MFA Challenges
• MFA in the cloud or on premise
• What’s next
• Compliance and Reporting
• MFA Conclusion
• Q&A
#mfa_uncovered
Why do we need authentication?
#mfa_uncovered
Brief Authentication History
6
• The Compatible Time-Sharing System (CTSS) – Worlds first computing password
Fernando Corbato Photo: MIT Museum
#mfa_uncovered
Brief Authentication History
7
#mfa_uncovered
• 1996 Secure Dynamics acquired RSA
Data Security & RSA SecurID firmly
established as Global Leader
• 1986 – the first SecurID 2fa card
sold!
• Allan Scherr - credited with
the earliest documented
case of password theft in
1962
On March 17, 2011, RSA's
SecurID compromised!
What is Multi-factor authentication?
#mfa_uncovered
Common authentication risks
#mfa_uncovered
9
•One password to rule them all:
•Malicious Software
•Man in the browser attack
•Man in the middle attack
•Account recovery
MFA Challenges
10
– Business challenges:
- The business may think that because there’s never been a security breach, there’s no
need for it.
– Cost?
- User acceptance, overcoming resistance
– Cost?
- Supporting processes already in place, are new ones required?
– Cost?
- Initial increased support calls
– Cost?
- commitment to ongoing maintenance & training
– Cost?
#mfa_uncovered
MFA Challenges
11
– Technical challenges to consider
- Hardware and software requirements
- Implementation, training and maintenance
– POC, staff, configuration and acceptance testing,
- Requires knowledge of systems being protected – OWA, Citrix Storefront, Vmware,
RDP, websites etc….
- Scalability, high availability and disaster recovery
- Post administration, device and user management
- Reporting
#mfa_uncovered
MFA in the cloud or on premise
12
#mfa_uncovered
What's next? – Windows 10
13
• Windows 10 new features:
– Windows Hello - Face recognition
- Requires camera such as Intel RealSense 3D Camera (F200)
– Windows Passport - helps securely authenticate to applications, websites and
networks on your behalf, no password sent
#mfa_uncovered
What's next? – iOS 9 & OS X 10.11
14
• Apple is introducing a revamped two-factor authentication system
#mfa_uncovered
Compliance & Reporting
15
• MFA - part of the solution when applications have regulatory requirements such as:
– NIST 800-63 Level 3, HIPAA, PCI DSS
• Is it monitored?
• Is there alerting?
• Logs kept and for how long?
• Systems policies enforced?
#mfa_uncovered
Shameless plug!
16
#mfa_uncovered
MFA Conclusion
17
• Understand your business
– Your data
- Secure data at its source (database), file server & email
– Entry points
- The weakest link is the Achilles heel
– Using integral or cloud solution, decide level of responsibility.
- Consider risks, reputation, costs and compliance.
#mfa_uncovered
• £260b+ Globally lost (annually) to cybercrime
• of which the UK accounts for 10%!
Another shameless plug!
18
#mfa_uncovered
Questions?
Thank you!
#mfa_uncovered
Ronnie Isherwood
Kevin Miller
@virtualfat
@millzee69

More Related Content

What's hot (20)

PPTX
public key infrastructure
vimal kumar
 
PPTX
The CIA triad.pptx
GulnurAzat
 
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
PPTX
Zero Trust and Data Security
Career Communications Group
 
PDF
Cyber Security Awareness
Ramiro Cid
 
PPTX
Zero Trust Model
Yash
 
PPTX
Endpoint Security Pres.pptx
NBBNOC
 
PPTX
What is zero trust model (ztm)
Ahmed Banafa
 
PDF
Network Security Presentation
Allan Pratt MBA
 
PDF
Network Security Fundamentals
Rahmat Suhatman
 
PPTX
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
PPTX
Cloud security Presentation
Ajay p
 
PDF
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
PDF
Microsoft Zero Trust
David J Rosenthal
 
PPTX
Cybercrime and Security
Noushad Hasan
 
PPTX
Introduction to Network Security
John Ely Masculino
 
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
slametarrokhim1
 
PPTX
Network security
Madhumithah Ilango
 
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
PPTX
Cia security model
Imran Ahmed
 
public key infrastructure
vimal kumar
 
The CIA triad.pptx
GulnurAzat
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Edureka!
 
Zero Trust and Data Security
Career Communications Group
 
Cyber Security Awareness
Ramiro Cid
 
Zero Trust Model
Yash
 
Endpoint Security Pres.pptx
NBBNOC
 
What is zero trust model (ztm)
Ahmed Banafa
 
Network Security Presentation
Allan Pratt MBA
 
Network Security Fundamentals
Rahmat Suhatman
 
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cloud security Presentation
Ajay p
 
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Microsoft Zero Trust
David J Rosenthal
 
Cybercrime and Security
Noushad Hasan
 
Introduction to Network Security
John Ely Masculino
 
Understanding Cyber Attack - Cyber Kill Chain.pdf
slametarrokhim1
 
Network security
Madhumithah Ilango
 
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cia security model
Imran Ahmed
 

Viewers also liked (20)

PDF
Two-factor authentication- A sample writing _Zaman
Asad Zaman
 
PDF
Trust elevation-share
Abbie Barbir
 
PDF
The Password Is Dead: An Argument for Multifactor Biometric Authentication
Veridium
 
PPTX
Intro to Smart Cards & Multi-Factor Authentication
hon1nbo
 
PPTX
3D password
anuradha srivastava
 
PDF
How are wearables going to shape digital marketing strategy in the future?
Dean Demellweek, MFA
 
PPTX
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
Clare Nelson, CISSP, CIPP-E
 
PPTX
組織利用におけるMFA管理方法を考える OpsJAWS Meetup#8
Kohei Hoshi
 
PPTX
Cybernetics
kwarush16
 
PDF
Identity for IoT: An Authentication Framework for the IoT
AllSeen Alliance
 
PPTX
MFA
João Camacho
 
PPT
Cybernetics Tradition
Dr. Dena Rosko
 
PPT
Cybernetics - So much more than robots
Catherine Novak, MA
 
PDF
3D Password PPT
Seminar Links
 
PPT
Memorandum And Articles Of Associations
Praveen Kumar
 
PPTX
Blue brain project ppt
Lishita Shah
 
PPTX
Cloud security ppt
Venkatesh Chary
 
PPTX
Blue Brain
Nikhil Vyas
 
PPT
3d password ppt
Gowsalyasri
 
PPTX
Cloud computing security issues and challenges
Dheeraj Negi
 
Two-factor authentication- A sample writing _Zaman
Asad Zaman
 
Trust elevation-share
Abbie Barbir
 
The Password Is Dead: An Argument for Multifactor Biometric Authentication
Veridium
 
Intro to Smart Cards & Multi-Factor Authentication
hon1nbo
 
3D password
anuradha srivastava
 
How are wearables going to shape digital marketing strategy in the future?
Dean Demellweek, MFA
 
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
Clare Nelson, CISSP, CIPP-E
 
組織利用におけるMFA管理方法を考える OpsJAWS Meetup#8
Kohei Hoshi
 
Cybernetics
kwarush16
 
Identity for IoT: An Authentication Framework for the IoT
AllSeen Alliance
 
Cybernetics Tradition
Dr. Dena Rosko
 
Cybernetics - So much more than robots
Catherine Novak, MA
 
3D Password PPT
Seminar Links
 
Memorandum And Articles Of Associations
Praveen Kumar
 
Blue brain project ppt
Lishita Shah
 
Cloud security ppt
Venkatesh Chary
 
Blue Brain
Nikhil Vyas
 
3d password ppt
Gowsalyasri
 
Cloud computing security issues and challenges
Dheeraj Negi
 
Ad

Similar to Multifactor Authentication (20)

PPTX
Evolution of MFA.pptx
IsraaAkramBasheer
 
PDF
The Importance of Multi-Factor Authentication (MFA)
kandrasupriya99
 
PDF
Defending Against Cyber Attacks: MFA as Your Digital Shield
Kevin Mathew
 
PPTX
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Bert Blevins
 
PDF
The Importance of Multi-Factor Authentication_ Protecting What Matters Most.pdf
CyberPro Magazine
 
PDF
How to Enhance Network Security with Multi-Factor Authentication
kandrasupriya99
 
PPTX
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Bert Blevins
 
PPTX
wbnthebestshieldagainstransomwareforibmie2206161-220616171022-6842abae.pptx
Precisely
 
PPTX
The Best Shield Against Ransomware for IBM i
Precisely
 
PDF
Why Multi-Factor Authentication (MFA) Is Essential for Modern Account Security
BORNSEC CONSULTING
 
PPTX
CI-ISSA '23 - Bad Multi-Factor
Curtis Brazzell
 
PDF
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Meetsolanki39
 
PPTX
Exploring Multi-Factor Authentication in Privileged Access Management
Bert Blevins
 
PPT
MFA, 42 & Compliance - Answers to the Wrong Questions
Dan Houser
 
PDF
Facts About MFA While Protecting Impersonation Prevention.pdf
BD Nut
 
PPTX
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Sirius
 
PPTX
Privileged Access Management (PAM) - NY DFS Regulation
Bert Blevins
 
PPTX
Best Practices for Multi-Factor Authentication on IBM i
Precisely
 
PDF
free blogger templates documents based on knowledge
vc2738012
 
PPTX
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Precisely
 
Evolution of MFA.pptx
IsraaAkramBasheer
 
The Importance of Multi-Factor Authentication (MFA)
kandrasupriya99
 
Defending Against Cyber Attacks: MFA as Your Digital Shield
Kevin Mathew
 
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Bert Blevins
 
The Importance of Multi-Factor Authentication_ Protecting What Matters Most.pdf
CyberPro Magazine
 
How to Enhance Network Security with Multi-Factor Authentication
kandrasupriya99
 
Enhancing Security with Multi-Factor Authentication in Privileged Access Mana...
Bert Blevins
 
wbnthebestshieldagainstransomwareforibmie2206161-220616171022-6842abae.pptx
Precisely
 
The Best Shield Against Ransomware for IBM i
Precisely
 
Why Multi-Factor Authentication (MFA) Is Essential for Modern Account Security
BORNSEC CONSULTING
 
CI-ISSA '23 - Bad Multi-Factor
Curtis Brazzell
 
Multi_Factor_Authentication_against_Data_Theft_PPTDark_Blue_Brown.pdf
Meetsolanki39
 
Exploring Multi-Factor Authentication in Privileged Access Management
Bert Blevins
 
MFA, 42 & Compliance - Answers to the Wrong Questions
Dan Houser
 
Facts About MFA While Protecting Impersonation Prevention.pdf
BD Nut
 
Best Practices for Multi-Factor Authentication: Delivering Stronger Security ...
Sirius
 
Privileged Access Management (PAM) - NY DFS Regulation
Bert Blevins
 
Best Practices for Multi-Factor Authentication on IBM i
Precisely
 
free blogger templates documents based on knowledge
vc2738012
 
Effectively Defending Your IBM i from Malware with Multi-Factor Authentication
Precisely
 
Ad

More from Ronnie Isherwood (14)

PPTX
Virtual Reality Smackdown
Ronnie Isherwood
 
PDF
Managing hypervisors with System Center Virtual Machine Manager 2012
Ronnie Isherwood
 
PDF
Protecting Microsoft Virtualization with DPM 2012 R2
Ronnie Isherwood
 
PDF
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Ronnie Isherwood
 
PDF
Microsoft Remote Desktop Services
Ronnie Isherwood
 
PDF
Windows Parental controls
Ronnie Isherwood
 
PDF
Building solutions with microsoft virtualisation
Ronnie Isherwood
 
PDF
Jersey Windows User Group
Ronnie Isherwood
 
PDF
Introduction to System Center Advisor and Virtual Machine Manager 2012
Ronnie Isherwood
 
PDF
Jersey Digital Momentum
Ronnie Isherwood
 
PDF
Gaming: How much is too much?
Ronnie Isherwood
 
PDF
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Ronnie Isherwood
 
PDF
Private Cloud Benefits
Ronnie Isherwood
 
PDF
Service Delivery & Automation Configure & Deploy
Ronnie Isherwood
 
Virtual Reality Smackdown
Ronnie Isherwood
 
Managing hypervisors with System Center Virtual Machine Manager 2012
Ronnie Isherwood
 
Protecting Microsoft Virtualization with DPM 2012 R2
Ronnie Isherwood
 
Integrating and Monitoring System Center Virtual Machine Manager with Operati...
Ronnie Isherwood
 
Microsoft Remote Desktop Services
Ronnie Isherwood
 
Windows Parental controls
Ronnie Isherwood
 
Building solutions with microsoft virtualisation
Ronnie Isherwood
 
Jersey Windows User Group
Ronnie Isherwood
 
Introduction to System Center Advisor and Virtual Machine Manager 2012
Ronnie Isherwood
 
Jersey Digital Momentum
Ronnie Isherwood
 
Gaming: How much is too much?
Ronnie Isherwood
 
Microsoft RDS, VDI, RemoteFX and what Service Pack 1 will bring us
Ronnie Isherwood
 
Private Cloud Benefits
Ronnie Isherwood
 
Service Delivery & Automation Configure & Deploy
Ronnie Isherwood
 

Recently uploaded (20)

PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Blockchain Transactions Explained For Everyone
CIFDAQ
 
PPTX
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
PDF
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PPTX
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
SWEBOK Guide and Software Services Engineering Education
Hironori Washizaki
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Blockchain Transactions Explained For Everyone
CIFDAQ
 
MSP360 Backup Scheduling and Retention Best Practices.pptx
MSP360
 
New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
UiPath Academic Alliance Educator Panels: Session 2 - Business Analyst Content
DianaGray10
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Jak MŚP w Europie Środkowo-Wschodniej odnajdują się w świecie AI
dominikamizerska1
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 

Multifactor Authentication

  • 2. Who? – Ronnie Isherwood Technology evangelist, presenter, author & editor Chairman (BCS Jersey) Founder (Jersey Techfair) #mfa_uncovered
  • 3. Who? – Kevin Miller Founder / Director Consultant #mfa_uncovered
  • 4. Agenda • Why do we need authentication? • A brief history of authentication • What is Multi-factor (MFA) authentication? • Common authentication risks • MFA Challenges • MFA in the cloud or on premise • What’s next • Compliance and Reporting • MFA Conclusion • Q&A #mfa_uncovered
  • 5. Why do we need authentication? #mfa_uncovered
  • 6. Brief Authentication History 6 • The Compatible Time-Sharing System (CTSS) – Worlds first computing password Fernando Corbato Photo: MIT Museum #mfa_uncovered
  • 7. Brief Authentication History 7 #mfa_uncovered • 1996 Secure Dynamics acquired RSA Data Security & RSA SecurID firmly established as Global Leader • 1986 – the first SecurID 2fa card sold! • Allan Scherr - credited with the earliest documented case of password theft in 1962 On March 17, 2011, RSA's SecurID compromised!
  • 8. What is Multi-factor authentication? #mfa_uncovered
  • 9. Common authentication risks #mfa_uncovered 9 •One password to rule them all: •Malicious Software •Man in the browser attack •Man in the middle attack •Account recovery
  • 10. MFA Challenges 10 – Business challenges: - The business may think that because there’s never been a security breach, there’s no need for it. – Cost? - User acceptance, overcoming resistance – Cost? - Supporting processes already in place, are new ones required? – Cost? - Initial increased support calls – Cost? - commitment to ongoing maintenance & training – Cost? #mfa_uncovered
  • 11. MFA Challenges 11 – Technical challenges to consider - Hardware and software requirements - Implementation, training and maintenance – POC, staff, configuration and acceptance testing, - Requires knowledge of systems being protected – OWA, Citrix Storefront, Vmware, RDP, websites etc…. - Scalability, high availability and disaster recovery - Post administration, device and user management - Reporting #mfa_uncovered
  • 12. MFA in the cloud or on premise 12 #mfa_uncovered
  • 13. What's next? – Windows 10 13 • Windows 10 new features: – Windows Hello - Face recognition - Requires camera such as Intel RealSense 3D Camera (F200) – Windows Passport - helps securely authenticate to applications, websites and networks on your behalf, no password sent #mfa_uncovered
  • 14. What's next? – iOS 9 & OS X 10.11 14 • Apple is introducing a revamped two-factor authentication system #mfa_uncovered
  • 15. Compliance & Reporting 15 • MFA - part of the solution when applications have regulatory requirements such as: – NIST 800-63 Level 3, HIPAA, PCI DSS • Is it monitored? • Is there alerting? • Logs kept and for how long? • Systems policies enforced? #mfa_uncovered
  • 17. MFA Conclusion 17 • Understand your business – Your data - Secure data at its source (database), file server & email – Entry points - The weakest link is the Achilles heel – Using integral or cloud solution, decide level of responsibility. - Consider risks, reputation, costs and compliance. #mfa_uncovered • £260b+ Globally lost (annually) to cybercrime • of which the UK accounts for 10%!