Insight into MFA Prompt Bombing and Mitigation Strategies

Logo
Presented by

Four-time Microsoft MVP Nick Cavalanci, LogRhythm Threat Research Engineers, Sally Vincent and Dan Kaiser

About this talk

With so many phishing attacks targeting credentials, more organizations are realizing they need multi-factor authentication (MFA) for users with access to critical data. In this webinar, four-time Microsoft MVP Nick Cavalanci, along with LogRhythm Threat Research Engineers, Sally Vincent and Dan Kaiser, discuss: • Real-world examples of MFA prompt bombing • Mitigation strategies to thwart this kind of attack Sally and Dan guide you through an analysis of MFA product logs relevant to detect unusual authentication activity. Throughout their threat hunting example, you will observe real-time detection of multi-factor authentication request generation using LogRhythm’s dashboarding, investigation, and real-time analytics capability. Watch this on-demand webinar to gain insight into MFA prompt bombing and mitigation strategies!
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (257)
Subscribers (76941)
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com