Token theft is the No. 1 unmitigated identity-based attack vector today. While strong authentication can mitigate most password-based attacks, this type of attack involves compromising a token after a victim user completed authentication. This session will cover the current threat landscape and what proactive measures you can take in your organization to prevent, detect and respond to token theft. You’ll get a walkthrough of a machine-learning algorithm that detects anomalous token usage, and detailed step-by-step incident response playbook you can use.
Learning Objectives:
Articulate to your stakeholders where token theft can occur and the prevalence of this attack type.
Determine what proactive measures to take to prevent and detect instances of token theft.
Respond to a token theft attack using the detailed process specified in an incident response playbook.