Public Sector Tech Talk E15: Credential Stuffing: A Real Risk to Government Security
Event Overview
Adversaries leverage many different attack methods to infiltrate government networks. One strategy that is becoming more prevalent is credential stuffing, the art of obtaining stolen or leaked login credentials such as username and password pairs for one account and using them to exploit other accounts of the same individual to achieve broader network access. Although not an overly sophisticated attack vector, the damage of this approach can be significant. This Public Sector Tech Talk will provide an overview of credential stuffing – what it is, how it is used to infiltrate government networks and what agencies can do to prevent it. The session will also provide recommendations on what steps agencies should take if and when an effective credential stuffing breach does occur.
What to expect
- What credential stuffing is and why it is becoming more prevalent in the government
- Why credential stuffing attacks are possible
- The impact of credential stuffing on agencies
- How to prevent credential stuffing attacks
Goals and Objectives
After viewing this episode, you will have a better understanding of how credential stuffing works – with a focus on a government environment – as well as the best ways to prevent such an attack.
Who should attend?
Public sector IT professionals looking to learn about emerging technologies and drivers shaping the future of government. This series is geared towards those that are developing and executing solutions that address the unique challenges faced by government agencies. In this case, a focus on credential stuffing and cybersecurity.
Presenters
F5, Inc.
Related content
From Strategy to Execution: Shaping the Future of the Public Sector