Protecting critical infrastructure against cyber attacks is of urgent importance across the world. With most cyber attacks, malicious actors don’t break in, they log in—using stolen credentials acquired through phishing. Once accounts are breached, attackers can steal data, damage critical systems or wreak havoc using ransomware. Multi-factor authentication (MFA) is the single most important defense, but not all forms of MFA are created equal.
Join Yubico for a roundtable discussion to learn about:
- How not all forms of multi-factor authentication (MFA) are created equal
- The need for adopting phishing-resistant MFA to secure user access
- Deployment best practices for securing critical infrastructure gathered from numerous global deployments across variety of sectors
In an interconnected ecosystem strengthening our cybersecurity posture is an important step toward winning the fight against cyber crime.
Confidentiality and Data Processing:
The information you provide in this form will be held in confidence by Yubico, Inc. and its Affiliates. Any personal information submitted in this form will be used by Yubico, Inc. and its Affiliates, for their performance of this webinar, and as such, you agree to being contacted and receiving relevant marketing materials. “Affiliate” means an entity that, directly or indirectly, controls, is controlled by, or is under common control with Yubico, Inc.