Grace Hopper Annual Conference Schedule

SESSIONS LIST

Mobile and Authentication: Presentations

October 15 4:00 pm-5:00 pm
361 A Level Three GRBCC
TRACK: Security/Privacy
Presentation / Lightning Talk
Everything You Need to Know About Password Managers
4:00 PM - 4:15 PM
LEVEL: Intermediate

Passwords have become a daily frustration for many Internet users. Best practices such as a lengthy, complex, and unique password for each login are often ignored in the name of convenience. Password management software can increase the convenience of storing many passwords securely. We’ll discuss the latest authentication-based cyber attacks, how to create strong passwords, and most importantly, the intricacies of password managers and how to choose one.

How to reduce Password-Management Costs? Explore the possibilities of Single-Sign-On.
4:15 PM - 4:30 PM
LEVEL: Intermediate

Today even in a mid-sized company employees are required to login to multiple systems resulting in multiple credentials to remember. This presentation talks about how to reduce the cost of maintaining multiple User&Passwords by implementing Single Sign On technology. The presentation focuses 3 business scenarios and corresponding SSO techniques . It explains how techniques like SAML, OAuth, ID federation can be implemented to enhance the ROSI(Return of Security Investments).

Continuous Authentication on Mobile Devices
4:30 PM - 4:45 PM
LEVEL: Advanced

Mobile devices are vulnerable to masquerade attacks as they can be easily lost or stolen. We introduce a technique for detecting unauthorized users by modeling the legitimate user’s typical behavior when using their mobile phone. The user’s behavior model augments typical authentication mechanisms (e.g. PINs or fingerprints) to provide continuous authentication of the user. A human 50-particiant user study demonstrates the detection of an unauthorized user attack within 2 minutes.

Security Features that Unlock Mobile Apps for Enterprises
4:45 PM - 5:00 PM
LEVEL: Beginner

The biggest hurdle for adoption of mobile apps within an enterprise is their perceived lack of security. To build an application that satisfies common CIO/CISO concerns, developers must understand their major concerns, the functionality offered by the mobile operating systems and the gaps exist between the concerns and what is available. This presentation focuses on the requirements and solutions that exist for building a secure and IT compliant mobile application.