Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDOAlliance
413 views
14 slides
May 15, 2024
Slide 1 of 14
1
2
3
4
5
6
7
8
9
10
11
12
13
14
About This Presentation
FIDO Seminar RSAC 2024
Size: 14.87 MB
Language: en
Added: May 15, 2024
Slides: 14 pages
Slide Content
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats Bojan Simic HYPR CEO & Co-Founder
Hackers don’t break in. They log in.
Phishing Passwords and MFA Credential Stuffing Using Leaked Passwords Malware & Keyloggers Steal Credentials Social Engineering to Obtain Credentials How Hackers Are Using AI to “Log in”
Existing Identity Security Controls are Insufficient PUSH/OTP/SMS MFA Bypass is Automated AI is Great at Guessing Users’ Passwords Social Engineering is Easier Than Ever Endpoints Don’t Protect Credentials ‘10,000 Microsoft Customers Targeted in Phishing Attack That Bypasses Multifactor Authentication’ ‘Major Casino Chain Hacked After Tricking IT Service Desk’ ‘Hackers Are Using AI To Steal Bank Account Passwords’ ‘Password Stealing and Keylogging Malware is Being Spread Through Fake Downloads’ BREAKING NEWS
The (Identity) Chain is Only as Strong as Its Weakest Link User Onboarding Authentication Password and MFA Reset Endpoint Access
How Passkeys Make The Difference User Onboarding 2nd Interview Require usage of passkey HR Onboarding I-9 Document Verification & Verify Passkey Account Provisioning Verify passkey & gant access 1st Interview Verify user identity & create device bound passkey
Authentication Password & MFA Reset How Passkeys Make The Difference
Vulnerable to AI Enabled Phishing Kits & Social Engineering Vulnerable to AI Enabled Phishing Kits & Social Engineering Vulnerable to Social Engineering Attacks Web & Mobile Apps password SMS OTP Password + Legacy MFA App User Support Desk Web Authentication Often Relies on Phishable Authentication. AI is Great at Phishing! Access Point Primary Authentication Fallback Authentication Authentication Reset
Web & Mobile Apps User Passkeys Can Stop Many AI Phishing & Social Engineering in Their Tracks Passkey on Mobile Device Secondary Mobile or Security Key Multiple Factors Without Passwords Authentication is Always Phishing Resistant Credential Provisioning Protected from Social Engineering Access Point Primary Authentication Fallback Authentication Authentication Reset Synced Passkey Presence + IDV
How Passkeys Make The Difference Endpoint Access
Primary Authentication Fallback Authentication User Passkeys are bound to specific device Easy to Phish and Can Be Intercepted by Malware & Keyloggers Windows + Mac password Access Point Endpoint Access Often Falls Back to Insecure Methods Windows Hello Touch ID
User Windows + Mac Windows Hello Touch ID HYPR Provides Phishing Resistance and Security for Credential Lifecycle Mobile Passkey or Security Key Multiple Factors Without Passwords Authentication is Always Phishing Resistant No Credentials for Malware or Keyloggers to Intercept Access Point Primary Authentication Fallback Authentication
The Identity Chain is Made Strong With Passkeys! User Onboarding Authentication Password and MFA Reset Endpoint Access