Authentication Security: Crafting a Bulletproof Password Reset Process

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

In today's fast-paced business environment, employees forgetting passwords or becoming locked out of devices is a headache for both users and IT teams alike. In addition, cyber-attackers are increasingly using the password reset process to gain unauthorized access to organizations’ network.

This webinar will highlight the common methods used by attackers to gain access to employees’ accounts, and the scale of the damage caused by these compromises.

The panellists will then share insights how to strengthen your password reset process to keep your data secure and free up your IT team to focus on more pressing matters. They will also highlight the importance of regular password vulnerability audits and how to protect your organization when credentials are compromised.

In this session you will learn:

  • An understanding of the current state of password security
  • How to create a password reset process that is secure, efficient and user-friendly
  • How to implement a rounded password security strategy 

Speakers

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Darren  James

Darren James

Senior Product Manager, Specops

Photo of Sam Lascelles

Sam Lascelles

digital trust and cyber security expert, PA Consulting

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Specops here: https://specopssoft.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.