Single Sign-On (SSO) Myths and Facts

Shira Rubinoff and David Habusha discuss the crucial topic of Single Sign-On (SSO) in the modern cybersecurity ecosystem, addressing misconceptions, convenience and also its security risks.

Why You Should Watch

Unpack the importance of monitoring SSO systems, adding additional layers of control like multi-factor authentication, and implementing anomaly detection to enhance security. This discussion is essential for anyone looking to implement SSO effectively while maintaining robust security measures in their organization.

Key Highlights

Digital Impersonation Scams and Their Impact

The increasing volume and complexity of digital impersonation attacks, highlighting the need for innovative solutions to combat these threats.

Preventing Credential Harvesting Attacks

Solutions to stop credential harvesting attacks by creating useless credentials, reducing the volume of attacks at the top of the funnel.

Cybersecurity Awareness and Self-Protection

The importance of self-awareness and taking personal responsibility, with a focus on detecting fake websites in real-time and reducing fraud by 20-25%.

Securing Digital Trust:
The Role of SSO in Modern Cybersecurity

Watch now to find out why there’s a need for continuous monitoring and understanding that SSO, while beneficial, is not a standalone solution for security.

The Schedule

SSO security considerations and controls

SSO security measures and emerging threats

Cybersecurity and user access management

Cybersecurity threats and defense strategies

This website uses cookies to ensure you get the best experience on our site. By continuing, you agree to our privacy policy.