fbpx
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

cybersecurity
education
€ EUR
  • $ USD
  • € EUR

[NT Conference 2019] Vulnerabilities in Credentials & How to Fix Them

On May 23rd, at the 24th NT Conference in Portorož, Slovenia, you could meet Mike Jankowski-Lorek, our Cloud Security and Database Expert. During his speech, Mike presented the traps of technology in credential security and showed tips on how to avoid them.

>>> Scroll down to view slides from Mike’s session and gain even more valuable knowledge >>>

Kinds of risk and solutions

Due to Mike’s very technical session, all attendees are now able to find out where their credentials are stored and how easy is to reveal them. Moreover – he answered the bothering question of whether cached credentials bring any danger or not.

As a Cloud Security and Database CQURE Expert Mike also couldn’t omit the role of cloud computing in data security and how it affects our safety.

Presentation of DPAPI
What is a key takeaway after the session? You will be able to discover all the unexpected places, where your passwords are hidden!

How is this possible? All thanks are going to the world discovery made by Mike and CQURE team – how to decrypt DPAPI protected data by leveraging usage of the private key stored as a LSA Secret on a domain controller. This reverse-engineered mechanism allows you to see how password attacks are performed and how you can avoid them. That was a valuable experience!

About the NT Conference
The NT Conference is the biggest Slovenian technological event, being one of the most successful and important IT and business conferences in the country.
This year the conference has been held for the 24th time and, as usual, it was full of valuable lessons. 3 days of more than 10 in-depth training, held by over 100 speakers! During this year’s edition over 2200 participants had the chance to talk, network and connect. Everything within the topic of technology. Those numbers speak for themselves!

If you have any questions please drop us a message via our contact form.

If you didn’t have the chance to visit the NT Conference in Slovenia, but still would like to see Mike’s presentation, we have a solution for you! You will find the source HERE.

See you soon!

You may also be interested in: