Identiverse
register for 2026
CyberRisk Alliance
The Event Workshops About Us
Attending Companies NHI Pavilion
Partners Speakers Sponsors
Topics Venue VIP Program Women in Identity Summit
AI and Identity Continuous Identity Non-Human Identity
Personal Identity SANS Executive
Advisory Board Blog
Media Press Releases Profiles in Action
Videos Webinars Who We Are
Identiverse
Home
The Event
Attending Companies NHI Pavilion Partners Speakers Sponsors Topics Venue VIP Program Women in Identity Summit
Workshops
AI and Identity Continuous Identity Non-Human Identity Personal Identity SANS Executive
About Us
Advisory Board Blog Media Press Releases Profiles in Action Videos Webinars Who We Are
Identiverse 2025 • Session
Safeguarding Enterprise Online Credentials Post Authentication Using Modern Technologies
Back to Main Agenda
Friday, June 6
Mandalay Bay H
9:05 am - 9:30 am
An Ho
Software Solution Architect
IBM

Protecting user sessions after strong authentication - an overview of modern session-to-device binding technologies suitable for both browsers and mobile applications. 

It is great to have a phishing resistant technology like FIDO2 Passkeys to protect user accounts during authentication. However, one might ask about post authentication - what can be used to protect access tokens and session cookies?  As we may already be aware, broken access control has climbed to the number one spot in the OWASP top ten list.  Session hijacking is a growing initial attack vector for online fraud and account takeover. The theft and re-use of "bearer" tokens have become more prevalent as passkeys increasingly gain adoptions in the industry.  Fortunately, there are newly introduced complimentary technologies such as Device Bound Session Credential (DBSC) and Demonstrate Proof of Possession (DPoP) that will help combatting the post authentication attacks.  Together with FIDO2 passkeys, these technologies provide a solution to protect the overall online credential ecosystem. 

Come join An and Shane to learn more about the complimentary technologies and take charge to implement a more secure solution to protect your enterprise online credentials!

PowerPoint PDF

Ways to stay in touch
Attendee Info & Inquiries
Sponsor Customer Service
Sponsorship & Exhibition Sales
Identiverse
Stay informed on the latest event updates
Follow us on
LinkedIn X Facebook
Hosted by CyberRisk Alliance
© 2025 identiverse • Privacy Policy • Terms of Use
register for 2026