Password Resets, Credential Compromise, and OpenSSL: Shortening Heartbleed's Long Tail


Many systems and environments saw usernames and passwords leaked by the Heartbleed attack. Love ‘em or hate ‘em, we know that users re-use passwords. Unlike major site compromises, password dumps, and public compromise notifications, very few organizations out there know whether or not their systems were hit, or what information was lost.

In this webcast on the importance of user account monitoring in light of Heartbleed, we will review how to:

  • Identify common user (mis)behaviors
  • Spot key user patterns that may indicate a compromised account
  • Create realistic detection timelines for compromised accounts
  • Use user safety to drive deeper partnership between IT and the user population
  • Detect and investigate compromised user accounts
  • Diagnose an attacker’s entry and lateral movements within the network

Speakers: Trey Ford, Global Security Strategist, Rapid7; Matt Hathaway, Senior Product Manager, Rapid7


Fill out the form below to watch this on-demand webcast