Thought Leadership

8 ‘Don’t Miss’ Sessions at RSAC 2024‍

Written By
Husnain Bajwa
Published On
Apr 30, 2024

As you get ready to pack your bags and head to RSA next week, we at Beyond Identity thought we would offer our picks for must-attend talks that stand out for their insightful, forward-thinking content. From exploring the practical applications of the CISA Zero Trust Maturity Model to the cutting-edge realm of passwordless authentication, these sessions are set to spark conversation and inspire action. Whether you're looking to enhance your detection engineering toolkit, understand the nuances of modern authentication threats, or discover cost-effective security solutions, these sessions are the ones we think you can’t miss.

Beyond the Pillars: The CISA Zero Trust Maturity Model in Practice

Session description: The CISA Zero Trust Maturity Model, with its five security pillars, is the de facto way to measure Zero Trust status and progress. However, real-world projects must take a cross-functional view, and deliver both business and security value. Join us for an open discussion of how to use and adapt this model in practice. We’ll discuss real-world examples of challenges, benefits, and approaches.

Why we think it is noteworthy: Zero Trust Maturity Model is often overlooked. Private sector security teams often don’t realize the value of CISA resources, but they are broadly applicable now.

Sign up here

A Blueprint for Detection Engineering: Tools, Processes, and Metrics

Session description: In the evolving landscape of cyber threats, effective detection engineering is key to safeguarding digital assets. This session will zero in on the blend of open-source tools and methodologies that define state-of-the-art detection engineering. Delve into ideation to action, measuring success through critical metrics, threat actor coverage, emerging threats, and MITRE ATT&CK coverage.

Why we care about it: We love thoughtful talks on systematic ways of looking at threats and risks based on data.

Sign uphere

Going Passwordless for Employees: Secure Modern Authentication at Work

Session Description: Passwords are the main cause of security breaches and are just a hassle to manage. Everyone would like to get rid of them. But how? This session will discuss how Accenture transitioned to passwordless and the story of their journey. Learn how passwordless technologies work, the reasons for moving to this game-changing level of security, and key learnings from our experience.

Why we’re going: No offense to Accenture, but if they can do it, so can you…and anyone. In all seriousness, passwordless is a trend, not a fad, and Global 2000 organizations are rapidly adopting the tech, and so should everyone else.

Sign up here

Beginner’s Guide to Bypassing Modern Authentication Methods to SSO

Session description: This session will explore the strengths and weaknesses of passwordless authentication, WebAuthn protocol fundamentals, and utilize famous attack tactics such as MITM and session hijacking to bypass different authentication mechanisms. Watch how to steal credentials from known federation providers such as Azure AD and Pingfed and get current mitigation suggestions for both application managers and developers.

Why we like it: We see informing people about the risks of MFA Bypass as God’s work and we’ll even compliment competitors if they do it.

Sign up here

Yubico: Unlocking the Future: Navigating Passkeys to Passwordless Security at Scale

Session description: Passkeys offer a more secure alternative to passwords and a road to modern passwordless authentication. While there are many roads to a passwordless state including Smart Card/PIV and FIDO-based approaches, one size may not fit all. Learn about the benefits of passkeys in the landscape of passwordless options and life cycle considerations for achieving a successful passwordless rollout at scale.

Why it's on our radar: Security keys from the likes of Yubico began the conversation on phishing-resistant approaches to authentication. We want to hear more.

How to Take Cookies from the Cookie Monster: Genesis Market Takedown

Session description: In April 2023, a global law enforcement task force disrupted the infamous Genesis Market, the largest browser cookie marketplace. This session analyzes how cybercriminals used the marketplace to bypass multi-factor authentication and fake victims' identities. Attendees will gain insight into the work Trellix did to assist Law Enforcement in the global takedown.

Why we think it is a 'must see': While WebAuthn and soft client that use local hardware like TPMs and TEEs can now provide equal or better protection, it is still worthwhile for security professionals to understand use cases where security keys are of use.

Sign up here

The State of Authentication 2024: The Global Progress Past Passwords

Session description: Join the FIDO Alliance and its industry stakeholders to learn about the latest developments in the global movement to passwordless technology for better security and user experiences. Attendees of this seminar will learn about the latest with FIDO and passkeys, hear case studies and achieved benefits from orgs offering passwordless sign-ins, and get best practices for their own implementations.

Why we think it's important: We love FIDO Alliance, and you should too. Passwordless is finally taking off with passkeys, and everyone needs to pay attention to these technologies.

Sign up here

Surf Security: Enterprise Zero Trust Browser™ - Better Security, Simple, Quick, & Lower Spend

Session description: Surf Security: Enterprise Zero Trust Browser™ - Better Security, Simple, Quick, & Lower Spend

Why we think it is a ‘don’t miss’: Beyond Identity loves new technologies and approaches that support a post-perimeter security model, and Surf with Enterprise Browsing is just that. VDI, browser isolation, and enterprise browsers are viable approaches for some specific use cases, and people should be aware of when and why to use them.

Sign up here

Find the full RSA agenda here

Get started with Device360 today
Weekly newsletter
No spam. Just the latest releases and tips, interesting articles, and exclusive interviews in your inbox every week.

8 ‘Don’t Miss’ Sessions at RSAC 2024‍

Download

As you get ready to pack your bags and head to RSA next week, we at Beyond Identity thought we would offer our picks for must-attend talks that stand out for their insightful, forward-thinking content. From exploring the practical applications of the CISA Zero Trust Maturity Model to the cutting-edge realm of passwordless authentication, these sessions are set to spark conversation and inspire action. Whether you're looking to enhance your detection engineering toolkit, understand the nuances of modern authentication threats, or discover cost-effective security solutions, these sessions are the ones we think you can’t miss.

Beyond the Pillars: The CISA Zero Trust Maturity Model in Practice

Session description: The CISA Zero Trust Maturity Model, with its five security pillars, is the de facto way to measure Zero Trust status and progress. However, real-world projects must take a cross-functional view, and deliver both business and security value. Join us for an open discussion of how to use and adapt this model in practice. We’ll discuss real-world examples of challenges, benefits, and approaches.

Why we think it is noteworthy: Zero Trust Maturity Model is often overlooked. Private sector security teams often don’t realize the value of CISA resources, but they are broadly applicable now.

Sign up here

A Blueprint for Detection Engineering: Tools, Processes, and Metrics

Session description: In the evolving landscape of cyber threats, effective detection engineering is key to safeguarding digital assets. This session will zero in on the blend of open-source tools and methodologies that define state-of-the-art detection engineering. Delve into ideation to action, measuring success through critical metrics, threat actor coverage, emerging threats, and MITRE ATT&CK coverage.

Why we care about it: We love thoughtful talks on systematic ways of looking at threats and risks based on data.

Sign uphere

Going Passwordless for Employees: Secure Modern Authentication at Work

Session Description: Passwords are the main cause of security breaches and are just a hassle to manage. Everyone would like to get rid of them. But how? This session will discuss how Accenture transitioned to passwordless and the story of their journey. Learn how passwordless technologies work, the reasons for moving to this game-changing level of security, and key learnings from our experience.

Why we’re going: No offense to Accenture, but if they can do it, so can you…and anyone. In all seriousness, passwordless is a trend, not a fad, and Global 2000 organizations are rapidly adopting the tech, and so should everyone else.

Sign up here

Beginner’s Guide to Bypassing Modern Authentication Methods to SSO

Session description: This session will explore the strengths and weaknesses of passwordless authentication, WebAuthn protocol fundamentals, and utilize famous attack tactics such as MITM and session hijacking to bypass different authentication mechanisms. Watch how to steal credentials from known federation providers such as Azure AD and Pingfed and get current mitigation suggestions for both application managers and developers.

Why we like it: We see informing people about the risks of MFA Bypass as God’s work and we’ll even compliment competitors if they do it.

Sign up here

Yubico: Unlocking the Future: Navigating Passkeys to Passwordless Security at Scale

Session description: Passkeys offer a more secure alternative to passwords and a road to modern passwordless authentication. While there are many roads to a passwordless state including Smart Card/PIV and FIDO-based approaches, one size may not fit all. Learn about the benefits of passkeys in the landscape of passwordless options and life cycle considerations for achieving a successful passwordless rollout at scale.

Why it's on our radar: Security keys from the likes of Yubico began the conversation on phishing-resistant approaches to authentication. We want to hear more.

How to Take Cookies from the Cookie Monster: Genesis Market Takedown

Session description: In April 2023, a global law enforcement task force disrupted the infamous Genesis Market, the largest browser cookie marketplace. This session analyzes how cybercriminals used the marketplace to bypass multi-factor authentication and fake victims' identities. Attendees will gain insight into the work Trellix did to assist Law Enforcement in the global takedown.

Why we think it is a 'must see': While WebAuthn and soft client that use local hardware like TPMs and TEEs can now provide equal or better protection, it is still worthwhile for security professionals to understand use cases where security keys are of use.

Sign up here

The State of Authentication 2024: The Global Progress Past Passwords

Session description: Join the FIDO Alliance and its industry stakeholders to learn about the latest developments in the global movement to passwordless technology for better security and user experiences. Attendees of this seminar will learn about the latest with FIDO and passkeys, hear case studies and achieved benefits from orgs offering passwordless sign-ins, and get best practices for their own implementations.

Why we think it's important: We love FIDO Alliance, and you should too. Passwordless is finally taking off with passkeys, and everyone needs to pay attention to these technologies.

Sign up here

Surf Security: Enterprise Zero Trust Browser™ - Better Security, Simple, Quick, & Lower Spend

Session description: Surf Security: Enterprise Zero Trust Browser™ - Better Security, Simple, Quick, & Lower Spend

Why we think it is a ‘don’t miss’: Beyond Identity loves new technologies and approaches that support a post-perimeter security model, and Surf with Enterprise Browsing is just that. VDI, browser isolation, and enterprise browsers are viable approaches for some specific use cases, and people should be aware of when and why to use them.

Sign up here

Find the full RSA agenda here

8 ‘Don’t Miss’ Sessions at RSAC 2024‍

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

As you get ready to pack your bags and head to RSA next week, we at Beyond Identity thought we would offer our picks for must-attend talks that stand out for their insightful, forward-thinking content. From exploring the practical applications of the CISA Zero Trust Maturity Model to the cutting-edge realm of passwordless authentication, these sessions are set to spark conversation and inspire action. Whether you're looking to enhance your detection engineering toolkit, understand the nuances of modern authentication threats, or discover cost-effective security solutions, these sessions are the ones we think you can’t miss.

Beyond the Pillars: The CISA Zero Trust Maturity Model in Practice

Session description: The CISA Zero Trust Maturity Model, with its five security pillars, is the de facto way to measure Zero Trust status and progress. However, real-world projects must take a cross-functional view, and deliver both business and security value. Join us for an open discussion of how to use and adapt this model in practice. We’ll discuss real-world examples of challenges, benefits, and approaches.

Why we think it is noteworthy: Zero Trust Maturity Model is often overlooked. Private sector security teams often don’t realize the value of CISA resources, but they are broadly applicable now.

Sign up here

A Blueprint for Detection Engineering: Tools, Processes, and Metrics

Session description: In the evolving landscape of cyber threats, effective detection engineering is key to safeguarding digital assets. This session will zero in on the blend of open-source tools and methodologies that define state-of-the-art detection engineering. Delve into ideation to action, measuring success through critical metrics, threat actor coverage, emerging threats, and MITRE ATT&CK coverage.

Why we care about it: We love thoughtful talks on systematic ways of looking at threats and risks based on data.

Sign uphere

Going Passwordless for Employees: Secure Modern Authentication at Work

Session Description: Passwords are the main cause of security breaches and are just a hassle to manage. Everyone would like to get rid of them. But how? This session will discuss how Accenture transitioned to passwordless and the story of their journey. Learn how passwordless technologies work, the reasons for moving to this game-changing level of security, and key learnings from our experience.

Why we’re going: No offense to Accenture, but if they can do it, so can you…and anyone. In all seriousness, passwordless is a trend, not a fad, and Global 2000 organizations are rapidly adopting the tech, and so should everyone else.

Sign up here

Beginner’s Guide to Bypassing Modern Authentication Methods to SSO

Session description: This session will explore the strengths and weaknesses of passwordless authentication, WebAuthn protocol fundamentals, and utilize famous attack tactics such as MITM and session hijacking to bypass different authentication mechanisms. Watch how to steal credentials from known federation providers such as Azure AD and Pingfed and get current mitigation suggestions for both application managers and developers.

Why we like it: We see informing people about the risks of MFA Bypass as God’s work and we’ll even compliment competitors if they do it.

Sign up here

Yubico: Unlocking the Future: Navigating Passkeys to Passwordless Security at Scale

Session description: Passkeys offer a more secure alternative to passwords and a road to modern passwordless authentication. While there are many roads to a passwordless state including Smart Card/PIV and FIDO-based approaches, one size may not fit all. Learn about the benefits of passkeys in the landscape of passwordless options and life cycle considerations for achieving a successful passwordless rollout at scale.

Why it's on our radar: Security keys from the likes of Yubico began the conversation on phishing-resistant approaches to authentication. We want to hear more.

How to Take Cookies from the Cookie Monster: Genesis Market Takedown

Session description: In April 2023, a global law enforcement task force disrupted the infamous Genesis Market, the largest browser cookie marketplace. This session analyzes how cybercriminals used the marketplace to bypass multi-factor authentication and fake victims' identities. Attendees will gain insight into the work Trellix did to assist Law Enforcement in the global takedown.

Why we think it is a 'must see': While WebAuthn and soft client that use local hardware like TPMs and TEEs can now provide equal or better protection, it is still worthwhile for security professionals to understand use cases where security keys are of use.

Sign up here

The State of Authentication 2024: The Global Progress Past Passwords

Session description: Join the FIDO Alliance and its industry stakeholders to learn about the latest developments in the global movement to passwordless technology for better security and user experiences. Attendees of this seminar will learn about the latest with FIDO and passkeys, hear case studies and achieved benefits from orgs offering passwordless sign-ins, and get best practices for their own implementations.

Why we think it's important: We love FIDO Alliance, and you should too. Passwordless is finally taking off with passkeys, and everyone needs to pay attention to these technologies.

Sign up here

Surf Security: Enterprise Zero Trust Browser™ - Better Security, Simple, Quick, & Lower Spend

Session description: Surf Security: Enterprise Zero Trust Browser™ - Better Security, Simple, Quick, & Lower Spend

Why we think it is a ‘don’t miss’: Beyond Identity loves new technologies and approaches that support a post-perimeter security model, and Surf with Enterprise Browsing is just that. VDI, browser isolation, and enterprise browsers are viable approaches for some specific use cases, and people should be aware of when and why to use them.

Sign up here

Find the full RSA agenda here

8 ‘Don’t Miss’ Sessions at RSAC 2024‍

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

As you get ready to pack your bags and head to RSA next week, we at Beyond Identity thought we would offer our picks for must-attend talks that stand out for their insightful, forward-thinking content. From exploring the practical applications of the CISA Zero Trust Maturity Model to the cutting-edge realm of passwordless authentication, these sessions are set to spark conversation and inspire action. Whether you're looking to enhance your detection engineering toolkit, understand the nuances of modern authentication threats, or discover cost-effective security solutions, these sessions are the ones we think you can’t miss.

Beyond the Pillars: The CISA Zero Trust Maturity Model in Practice

Session description: The CISA Zero Trust Maturity Model, with its five security pillars, is the de facto way to measure Zero Trust status and progress. However, real-world projects must take a cross-functional view, and deliver both business and security value. Join us for an open discussion of how to use and adapt this model in practice. We’ll discuss real-world examples of challenges, benefits, and approaches.

Why we think it is noteworthy: Zero Trust Maturity Model is often overlooked. Private sector security teams often don’t realize the value of CISA resources, but they are broadly applicable now.

Sign up here

A Blueprint for Detection Engineering: Tools, Processes, and Metrics

Session description: In the evolving landscape of cyber threats, effective detection engineering is key to safeguarding digital assets. This session will zero in on the blend of open-source tools and methodologies that define state-of-the-art detection engineering. Delve into ideation to action, measuring success through critical metrics, threat actor coverage, emerging threats, and MITRE ATT&CK coverage.

Why we care about it: We love thoughtful talks on systematic ways of looking at threats and risks based on data.

Sign uphere

Going Passwordless for Employees: Secure Modern Authentication at Work

Session Description: Passwords are the main cause of security breaches and are just a hassle to manage. Everyone would like to get rid of them. But how? This session will discuss how Accenture transitioned to passwordless and the story of their journey. Learn how passwordless technologies work, the reasons for moving to this game-changing level of security, and key learnings from our experience.

Why we’re going: No offense to Accenture, but if they can do it, so can you…and anyone. In all seriousness, passwordless is a trend, not a fad, and Global 2000 organizations are rapidly adopting the tech, and so should everyone else.

Sign up here

Beginner’s Guide to Bypassing Modern Authentication Methods to SSO

Session description: This session will explore the strengths and weaknesses of passwordless authentication, WebAuthn protocol fundamentals, and utilize famous attack tactics such as MITM and session hijacking to bypass different authentication mechanisms. Watch how to steal credentials from known federation providers such as Azure AD and Pingfed and get current mitigation suggestions for both application managers and developers.

Why we like it: We see informing people about the risks of MFA Bypass as God’s work and we’ll even compliment competitors if they do it.

Sign up here

Yubico: Unlocking the Future: Navigating Passkeys to Passwordless Security at Scale

Session description: Passkeys offer a more secure alternative to passwords and a road to modern passwordless authentication. While there are many roads to a passwordless state including Smart Card/PIV and FIDO-based approaches, one size may not fit all. Learn about the benefits of passkeys in the landscape of passwordless options and life cycle considerations for achieving a successful passwordless rollout at scale.

Why it's on our radar: Security keys from the likes of Yubico began the conversation on phishing-resistant approaches to authentication. We want to hear more.

How to Take Cookies from the Cookie Monster: Genesis Market Takedown

Session description: In April 2023, a global law enforcement task force disrupted the infamous Genesis Market, the largest browser cookie marketplace. This session analyzes how cybercriminals used the marketplace to bypass multi-factor authentication and fake victims' identities. Attendees will gain insight into the work Trellix did to assist Law Enforcement in the global takedown.

Why we think it is a 'must see': While WebAuthn and soft client that use local hardware like TPMs and TEEs can now provide equal or better protection, it is still worthwhile for security professionals to understand use cases where security keys are of use.

Sign up here

The State of Authentication 2024: The Global Progress Past Passwords

Session description: Join the FIDO Alliance and its industry stakeholders to learn about the latest developments in the global movement to passwordless technology for better security and user experiences. Attendees of this seminar will learn about the latest with FIDO and passkeys, hear case studies and achieved benefits from orgs offering passwordless sign-ins, and get best practices for their own implementations.

Why we think it's important: We love FIDO Alliance, and you should too. Passwordless is finally taking off with passkeys, and everyone needs to pay attention to these technologies.

Sign up here

Surf Security: Enterprise Zero Trust Browser™ - Better Security, Simple, Quick, & Lower Spend

Session description: Surf Security: Enterprise Zero Trust Browser™ - Better Security, Simple, Quick, & Lower Spend

Why we think it is a ‘don’t miss’: Beyond Identity loves new technologies and approaches that support a post-perimeter security model, and Surf with Enterprise Browsing is just that. VDI, browser isolation, and enterprise browsers are viable approaches for some specific use cases, and people should be aware of when and why to use them.

Sign up here

Find the full RSA agenda here

Book

8 ‘Don’t Miss’ Sessions at RSAC 2024‍

Phishing resistance in security solutions has become a necessity. Learn the differences between the solutions and what you need to be phishing resistant.

Download the book

By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.