Skip to Content

This browser is no longer supported.

For the best WWT.com experience, please use one of our supported browsers.

Safari Logo Safari Chrome Logo Chrome Firefox Logo Firefox Edge Logo Edge
Search wwt.com...
Top Page Results

See all search results

Featured Solutions
What's trending
?
Home
Solutions & Services
Solutions
Automation & Orchestration
Cloud
Data Center
Digital
Digital Workspace
ESG
Mobility
Networking
Security Transformation
See all Solutions
See all Solutions
Services
Application Services
ATC Lab Services
Consulting Services
Customer Success
Infrastructure Services
Mergers & Acquisitions
Strategic Resourcing
Supply Chain & Integration
See all Services
See all Services
Industries
Utilities
Financial Services
Global Service Provider
Healthcare
Life Sciences
Manufacturing
Oil & Gas
Public Sector
Retail
See all Industries
See all Industries
Partners
Cisco
Dell Technologies
HPE
NetApp
VMware
f5
Intel
Microsoft
Palo Alto
See all Partners
See all Partners
Learning & Support
ATC
Communities
Events
Labs
Research
About
Footer Links
Careers
Contact Us
Diversity & Inclusion
Locations
News
Sustainability
Public Sector Security Strategy Security Transformation

Webinar

Public Sector Tech Talk E15: Credential Stuffing: A Real Risk to Government Security

  • Details
  • Resources
  • Select an Option

Event Overview

Adversaries leverage many different attack methods to infiltrate government networks. One strategy that is becoming more prevalent is credential stuffing, the art of obtaining stolen or leaked login credentials such as username and password pairs for one account and using them to exploit other accounts of the same individual to achieve broader network access. Although not an overly sophisticated attack vector, the damage of this approach can be significant. This Public Sector Tech Talk will provide an overview of credential stuffing – what it is, how it is used to infiltrate government networks and what agencies can do to prevent it. The session will also provide recommendations on what steps agencies should take if and when an effective credential stuffing breach does occur.

Goals and Objectives

After viewing this episode, you will have a better understanding of how credential stuffing works – with a focus on a government environment – as well as the best ways to prevent such an attack.

Who should attend?

Public sector IT professionals looking to learn about emerging technologies and drivers shaping the future of government. This series is geared towards those that are developing and executing solutions that address the unique challenges faced by government agencies. In this case, a focus on credential stuffing and cybersecurity.

Presenters

User Profile Picture

Sander Vinberg

F5 NETWORKS LIMITED

Invite people to join this event

© World Wide Technology. All Rights Reserved
  • About
  • Careers
  • Locations
  • News
  • Press Kit
  • Contact Us
  • Privacy Policy
  • Acceptable Use Policy
  • Quality
  • Information Security
  • Supplier Management
  • Cookies