Improving Security & Compliance with Credential Verification


Stan Bounev
Founder & CEO

Chris Olive
Strategic Advisory Solutions Consultant

Steve Tout
Chief Instigator
Nonconformist Innovation Media

All organizations need protection against cyber-attacks and security threats and investing in those protections is important. Most data breaches are the result of weak and compromised credentials, and as such, are preventable. With credential verification integrated into enterprise and cloud-based IAM solutions, a company reduces its risk of internal and external attacks on its sensitive data and accounts.

SolarWinds hack was the 'largest and most sophisticated attack' ever according to Microsoft General Counsel and Executive VP Brad Smith. Jay Gazlay, Technical Strategist at the Cybersecurity and Infrastructure Security Agency says that in the Post SolarWinds world, "Identity is everything now." Leading organizations that put security first must prioritize Zero Trust practices and integrate credential verification into their identity fabric.

During this session, you'll learn about

  • Attacking the MFA lifecycle using compromised primary credentials
  • Going beyond free breach notification services
  • Developing a strategy to automate your response and remediation efforts
  • Integrating credential verification at every step of the user management life cycle
  • Improving your security and compliance posture by aligning with NIST 800-63B and the California Privacy Rights Act of 2020

Access the recording below


We Accept Only Business Email Addresses – No Free or ISP Email Addresses

Please enter a business email address to obtain proper delivery of the product. If you do not have a business email address or experience any issues during the registration process, please send an email to