Blueprint: Build the Best in Cyber Defense

How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud

Season 5 Episode 3

Use Left/Right to seek, Home/End to jump to start or end. Hold shift to jump forward or backward.

0:00 | 54:03

Mark Morowczynski returns for his 4th(!) time with his Microsoft coworker and identity and authentication expert Tarek Dawoud in this incredibly insightful conversation on the what, why, and how of  phishing resistant credentials that YOU can implement right now!
 
This conversation covers:

  • What makes MFA phishable?
  • What phishing resistant credentials are and how they work
  • The history and modern methods for phishing resistant credentials
  • What attacks will be used once we move to phishing resistant credentials, and how to prevent and detect it
  • How verified digital identities and corporate identification can help further reduce risk of help desk based attacks
  • Shifting the culture to adopt a passwordless login
  • Key logs to detect identity attacks
  • Resources for learning KQL


Episode Links:

Contact, Courses, and More:

For feedback, reviews, guest pitches, or to get in contact with me for any other reason, head to blueprintpodcast.live!

Check out John's SOC Training Courses for SOC Analysts and Leaders:

Follow and Connect with John:  LinkedIn