Overview
Syllabus
Intro
Why strong authentication
Companies in common
RSA hack
Market size
Breach statistics
Online fraud
Hackers everywhere
Breaches
Trends
Why now
Authentication methods
Issues faced by IT managers
What is Oath
Members of Oath
Algorithms
Roadmap
Certification Program
Review
Framework
Oath
Credential provisioning
Objectives
Certification
Typical Scenario
Framework Overview
Why OTP is still expensive
Why OTP should be a commodity
Lin OTP
Lin schematic
Authentication integration architecture
Thirdparty authentication
Adaptive Authentication
Biometrics
Behavioral Advantage
Security Technologies Fail
Behavioral Biometrics
We are changing
Is it creepy
Taught by
OWASP Foundation