Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx

FIDOAlliance 413 views 14 slides May 15, 2024
Slide 1
Slide 1 of 14
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14

About This Presentation

FIDO Seminar RSAC 2024


Slide Content

Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats Bojan Simic HYPR CEO & Co-Founder

Hackers don’t break in. They log in.

Phishing Passwords and MFA Credential Stuffing Using Leaked Passwords Malware & Keyloggers Steal Credentials Social Engineering to Obtain Credentials How Hackers Are Using AI to “Log in”

Existing Identity Security Controls are Insufficient PUSH/OTP/SMS MFA Bypass is Automated AI is Great at Guessing Users’ Passwords Social Engineering is Easier Than Ever Endpoints Don’t Protect Credentials ‘10,000 Microsoft Customers Targeted in Phishing Attack That Bypasses Multifactor Authentication’ ‘Major Casino Chain Hacked After Tricking IT Service Desk’ ‘Hackers Are Using AI To Steal Bank Account Passwords’ ‘Password Stealing and Keylogging Malware is Being Spread Through Fake Downloads’ BREAKING NEWS

The (Identity) Chain is Only as Strong as Its Weakest Link User Onboarding Authentication Password and MFA Reset Endpoint Access

How Passkeys Make The Difference User Onboarding 2nd Interview Require usage of passkey HR Onboarding I-9 Document Verification & Verify Passkey Account Provisioning Verify passkey & gant access 1st Interview Verify user identity & create device bound passkey

Authentication Password & MFA Reset How Passkeys Make The Difference

Vulnerable to AI Enabled Phishing Kits & Social Engineering Vulnerable to AI Enabled Phishing Kits & Social Engineering Vulnerable to Social Engineering Attacks Web & Mobile Apps password SMS OTP Password + Legacy MFA App User Support Desk Web Authentication Often Relies on Phishable Authentication. AI is Great at Phishing! Access Point Primary Authentication Fallback Authentication Authentication Reset

Web & Mobile Apps User Passkeys Can Stop Many AI Phishing & Social Engineering in Their Tracks Passkey on Mobile Device Secondary Mobile or Security Key Multiple Factors Without Passwords Authentication is Always Phishing Resistant Credential Provisioning Protected from Social Engineering Access Point Primary Authentication Fallback Authentication Authentication Reset Synced Passkey Presence + IDV

How Passkeys Make The Difference Endpoint Access

Primary Authentication Fallback Authentication User Passkeys are bound to specific device Easy to Phish and Can Be Intercepted by Malware & Keyloggers Windows + Mac password Access Point Endpoint Access Often Falls Back to Insecure Methods Windows Hello Touch ID

User Windows + Mac Windows Hello Touch ID HYPR Provides Phishing Resistance and Security for Credential Lifecycle Mobile Passkey or Security Key Multiple Factors Without Passwords Authentication is Always Phishing Resistant No Credentials for Malware or Keyloggers to Intercept Access Point Primary Authentication Fallback Authentication

The Identity Chain is Made Strong With Passkeys! User Onboarding Authentication Password and MFA Reset Endpoint Access

Thank You! [email protected] @bojansimic linkedin.com/in/bojansimic
Tags