The Future of Strong Authentication
Facebook Twitter LinkedIn

Panel: The Risks of Compromised Credentials

Combined Session
Wednesday, September 13, 2017 14:00—15:00
Location: 406

The news is full of stories about usernames and passwords being breached by the millions.  What do hackers do with the stolen passwords?  What techniques are identity providers using to prevent loss and misuse of credentials?  This panel will look at current work and future designs on how to reduce identity fraud.

This expert panel will explore the role that detection of compromised credentials plays in an IAM program for risk mitigation and delivering safer online experiences.

Michael Hamilton
Michael Hamilton
Critical Informatics
Michael has 25 years of experience in information security, as a practitioner, consultant, executive and entrepreneur. As former Chief Information Security Officer for the City of Seattle, Michael...
Vikram Kakumani
Vikram Kakumani
Microsoft
Vikram Kakumani is the Principal Group Engineering Manager of Azure Active Directory B2C - the Consumer Identity Access management offering from Microsoft. A long time Microsoftee, Vikram joined...
Todd Oxford
Todd Oxford
The Home Depot
Enterprise infrastructure management professional with 23 years of IT experience. Extensive knowledge of Information Technology with proven skills in various IT disciplines; project management,...
Sarah Squire
Sarah Squire
Ping Identity
Sarah Squire is a Senior Technical Architect at Ping Identity. She is a co-author of NIST Special Publication 800-63C Digital Identity Guidelines, which outlines federated authentication standards...
Dr. Jimmy Su
Dr. Jimmy Su
JD.com
Jimmy Su is the head of JD security research center. He joined JD in January of 2017. Before joining JD, he was the director of advanced threat research at FireEye Labs. He led the cutting-edge...
Steve Tout
Steve Tout
VeriClouds
Steve is CEO at VeriClouds and an entrepreneur with over 15 years of experience in enterprise IT focusing on IAM program leadership, systems architecture, implementation and operations for the...
Subscribe for updates
Please provide your email address