In 2016, NIST announced it was deprecating SMS-based 2FA (second-factor authentication) from its Digital Authentication Guidance. As the internet works to harden application and online security, what are the proper options available for truly secure authentication? What are those OOB (out-of-band) transactions anyway? Why is identity security so hard? Come learn about the tools that define the identity security landscape and how to easily integrate strong identity verification methods with your existing services. BYOA (bring your own acronyms).


Comments are closed.

Rated 5

Joanne Garlow at 15:41 on 16 Nov 2017

Great talk - super useful!

A fantastic primer into the infosec community, demystifying terms and acronyms that are common on Hacker News but may be outside the vernacular of the typical developer.

I also learned about SS7 and how totally vulnerable we are. Thanks for that, Eric — I was getting too comfortable ;)