Thought Leadership

Password-Palooza Webinar Recap

Written By
Beyond Identity Blog
Published On
Oct 13, 2021

Passwords have been the downfall of many organizations, yet plenty still continue to use them. In fact, according to the Verizon Data Breach Incident Report, credential theft accounted for 89% of web application breaches. Passwords are the weakest link in any security plan, and without removing them from your organization, your mission-critical applications are at risk of attack. In this webinar, listen in as Paula Januszkiewicz, along with Beyond Identity CTO Jasson Casey, discuss how zero trust holds up from the perspective of both CISO and hacker. 

Some topics discussed include...

  • The wide variety of ways attackers can find your passwords
  • How attackers use your password to access other parts of the network
  • How by removing passwords: you can remove that vulnerability to your system

Paula Januszkiewiczis security expert, pen tester, trainer, and the Founder and CEO of CQURE Januszkiewicz is a world-class cybersecurity expert, consulting with customers all around the world, and a top speaker at global conferences.

Get started with Device360 today
Weekly newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.

Password-Palooza Webinar Recap

Download

Passwords have been the downfall of many organizations, yet plenty still continue to use them. In fact, according to the Verizon Data Breach Incident Report, credential theft accounted for 89% of web application breaches. Passwords are the weakest link in any security plan, and without removing them from your organization, your mission-critical applications are at risk of attack. In this webinar, listen in as Paula Januszkiewicz, along with Beyond Identity CTO Jasson Casey, discuss how zero trust holds up from the perspective of both CISO and hacker. 

Some topics discussed include...

  • The wide variety of ways attackers can find your passwords
  • How attackers use your password to access other parts of the network
  • How by removing passwords: you can remove that vulnerability to your system

Paula Januszkiewiczis security expert, pen tester, trainer, and the Founder and CEO of CQURE Januszkiewicz is a world-class cybersecurity expert, consulting with customers all around the world, and a top speaker at global conferences.

Password-Palooza Webinar Recap

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Passwords have been the downfall of many organizations, yet plenty still continue to use them. In fact, according to the Verizon Data Breach Incident Report, credential theft accounted for 89% of web application breaches. Passwords are the weakest link in any security plan, and without removing them from your organization, your mission-critical applications are at risk of attack. In this webinar, listen in as Paula Januszkiewicz, along with Beyond Identity CTO Jasson Casey, discuss how zero trust holds up from the perspective of both CISO and hacker. 

Some topics discussed include...

  • The wide variety of ways attackers can find your passwords
  • How attackers use your password to access other parts of the network
  • How by removing passwords: you can remove that vulnerability to your system

Paula Januszkiewiczis security expert, pen tester, trainer, and the Founder and CEO of CQURE Januszkiewicz is a world-class cybersecurity expert, consulting with customers all around the world, and a top speaker at global conferences.

Password-Palooza Webinar Recap

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Passwords have been the downfall of many organizations, yet plenty still continue to use them. In fact, according to the Verizon Data Breach Incident Report, credential theft accounted for 89% of web application breaches. Passwords are the weakest link in any security plan, and without removing them from your organization, your mission-critical applications are at risk of attack. In this webinar, listen in as Paula Januszkiewicz, along with Beyond Identity CTO Jasson Casey, discuss how zero trust holds up from the perspective of both CISO and hacker. 

Some topics discussed include...

  • The wide variety of ways attackers can find your passwords
  • How attackers use your password to access other parts of the network
  • How by removing passwords: you can remove that vulnerability to your system

Paula Januszkiewiczis security expert, pen tester, trainer, and the Founder and CEO of CQURE Januszkiewicz is a world-class cybersecurity expert, consulting with customers all around the world, and a top speaker at global conferences.

Book

Password-Palooza Webinar Recap

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Download the book

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.