Attendee Info & Inquiries
Credential stuffing attacks are like finding Waldo in a crowded scene—hidden bots blend into legitimate traffic, making them hard to spot. This talk takes you through our journey of identifying these stealthy threats, understanding their behavior, and implementing effective defenses. Learn how we started our journey and have since matured our processes and tools to adapt as adversaries change and improve. You will see how we find and fight to stop credential stuffing attacks in their tracks while keeping our systems secure and users happy.