Log In Through the Front Door - Automating Defense Against Credential Leaks
Security BSides San Francisco via YouTube
The Most Addictive Python and SQL Courses
Learn the Skills Netflix, Meta, and Capital One Actually Hire For
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a 31-minute conference talk from BSidesSF 2025 that addresses the critical cybersecurity challenge of credential-based attacks. Learn how cybercriminals are bypassing traditional security measures by purchasing stolen credentials from the dark web and gaining unauthorized access to networks through legitimate login processes rather than breaking in through vulnerabilities. Discover the alarming statistic that 80% of cyberattacks now involve stolen credentials and understand why traditional perimeter defenses are insufficient against this threat vector. Examine Automated Credential Threat Monitoring (ACT) as a proactive defense strategy that helps organizations stay ahead of credential-based threats by continuously monitoring for compromised credentials before they can be exploited. Gain insights into how organizations can shift from reactive to proactive security postures by implementing automated systems that detect and respond to credential leaks in real-time, effectively closing the window of opportunity for attackers who rely on stolen authentication data.
Syllabus
BSidesSF 2025 - Log In Through the Front Door: Automating Defense Against...(Barath Subramaniam)
Taught by
Security BSides San Francisco