Single Sign-On (SSO) Myths and Facts
Shira Rubinoff and David Habusha discuss the crucial topic of Single Sign-On (SSO) in the modern cybersecurity ecosystem, addressing misconceptions, convenience and also its security risks.
Shira Rubinoff
Cybersecurity executive, Advisor & author
David Habusha
Head of Product
Why You Should Watch
Unpack the importance of monitoring SSO systems, adding additional layers of control like multi-factor authentication, and implementing anomaly detection to enhance security. This discussion is essential for anyone looking to implement SSO effectively while maintaining robust security measures in their organization.
Key Highlights
Digital Impersonation Scams and Their Impact
The increasing volume and complexity of digital impersonation attacks, highlighting the need for innovative solutions to combat these threats.
Preventing Credential Harvesting Attacks
Solutions to stop credential harvesting attacks by creating useless credentials, reducing the volume of attacks at the top of the funnel.
Cybersecurity Awareness and Self-Protection
The importance of self-awareness and taking personal responsibility, with a focus on detecting fake websites in real-time and reducing fraud by 20-25%.
Securing Digital Trust:
The Role of SSO in Modern Cybersecurity
Watch now to find out why there’s a need for continuous monitoring and understanding that SSO, while beneficial, is not a standalone solution for security.
The Schedule
SSO security considerations and controls
SSO security measures and emerging threats
Cybersecurity and user access management
Cybersecurity threats and defense strategies