Submit Search
Upload
2FA Best Practices
•
3 likes
•
382 views
K
Kelley Robinson
Follow
From Superclass 2018
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 33
Download now
Download to read offline
Recommended
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
Kelley Robinson
Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIR
Kelley Robinson
PSD2, SCA, WTF?
PSD2, SCA, WTF?
Kelley Robinson
Auth on the web: better authentication
Auth on the web: better authentication
Kelley Robinson
Identiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FA
Kelley Robinson
WebAuthn
WebAuthn
Kelley Robinson
2FA in 2020 and Beyond
2FA in 2020 and Beyond
Kelley Robinson
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
SecureAuth
Recommended
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
Kelley Robinson
Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIR
Kelley Robinson
PSD2, SCA, WTF?
PSD2, SCA, WTF?
Kelley Robinson
Auth on the web: better authentication
Auth on the web: better authentication
Kelley Robinson
Identiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FA
Kelley Robinson
WebAuthn
WebAuthn
Kelley Robinson
2FA in 2020 and Beyond
2FA in 2020 and Beyond
Kelley Robinson
Passwordless is Possible - How to Remove Passwords and Improve Security
Passwordless is Possible - How to Remove Passwords and Improve Security
SecureAuth
Passwordless auth
Passwordless auth
Lesha Bhansali
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
HYPR
Managing Mobile Business Insecurities
Managing Mobile Business Insecurities
Ping Identity
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Ping Identity
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
Lookout
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
Skycure
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
Lookout
Passwordless Authentication
Passwordless Authentication
Enterprise Management Associates
Outside the Office: Mobile Security
Outside the Office: Mobile Security
McKonly & Asbury, LLP
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
Amazon Web Services
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
IBM Security
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
SISA Information Security Pvt.Ltd
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
Quick Heal Technologies Ltd.
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
NowSecure
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
Mobile Security at the World Cup
Mobile Security at the World Cup
Lookout
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
IBM Security
How to augment On-premise Call Centers to Scale-out to the Cloud
How to augment On-premise Call Centers to Scale-out to the Cloud
Daniel Zivkovic
Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019
Elizabeth (Lizzie) Siegle
More Related Content
What's hot
Passwordless auth
Passwordless auth
Lesha Bhansali
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
HYPR
Managing Mobile Business Insecurities
Managing Mobile Business Insecurities
Ping Identity
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Ping Identity
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
Lookout
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
Skycure
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
Lookout
Passwordless Authentication
Passwordless Authentication
Enterprise Management Associates
Outside the Office: Mobile Security
Outside the Office: Mobile Security
McKonly & Asbury, LLP
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
Amazon Web Services
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
IBM Security
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
SISA Information Security Pvt.Ltd
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
Quick Heal Technologies Ltd.
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
NowSecure
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
Lookout
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
IBM Security
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
SecureAuth
Mobile Security at the World Cup
Mobile Security at the World Cup
Lookout
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
IBM Security
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
IBM Security
What's hot
(20)
Passwordless auth
Passwordless auth
HYPR: The Leading Provider of True Passwordless Security®
HYPR: The Leading Provider of True Passwordless Security®
Managing Mobile Business Insecurities
Managing Mobile Business Insecurities
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
How Aligned Are IT, Employees and Security Practices in Today's Mobile World?
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security: The 5 Questions Modern Organizations Are Asking
Mobile Security - 2015 Wrap-up and 2016 Predictions
Mobile Security - 2015 Wrap-up and 2016 Predictions
5 Ways to Protect your Mobile Security
5 Ways to Protect your Mobile Security
Passwordless Authentication
Passwordless Authentication
Outside the Office: Mobile Security
Outside the Office: Mobile Security
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
New trends in Payments Security: NFC & Mobile
New trends in Payments Security: NFC & Mobile
Top 7 Mobile Banking Security Tips
Top 7 Mobile Banking Security Tips
Mobile App Security Predictions 2019
Mobile App Security Predictions 2019
2015 Cybersecurity Predictions
2015 Cybersecurity Predictions
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
The ROI on Intrusion Prevention: Protecting Both Your Network & Investment
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Mobile Security at the World Cup
Mobile Security at the World Cup
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
Securing Mobile Banking Apps - You Are Only as Strong as Your Weakest Link
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
The Next Stage of Fraud Protection: IBM Security Trusteer Fraud Protection Suite
Similar to 2FA Best Practices
How to augment On-premise Call Centers to Scale-out to the Cloud
How to augment On-premise Call Centers to Scale-out to the Cloud
Daniel Zivkovic
Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019
Elizabeth (Lizzie) Siegle
Twilio
Twilio
affifahzafar
Keynote_AWS_BecomingAHighFrequencyEnterprise
Keynote_AWS_BecomingAHighFrequencyEnterprise
Amazon Web Services
Scale as an Enabler for Security
Scale as an Enabler for Security
scoopnewsgroup
The Future of SaaS is Product Led. Are You Ready?
The Future of SaaS is Product Led. Are You Ready?
OpenView
AWS Transformation Day - Toronto 2018
AWS Transformation Day - Toronto 2018
Amazon Web Services
APIdays Zurich 2019 - APIs for real time communication Miguel Lopes, Dialogic
APIdays Zurich 2019 - APIs for real time communication Miguel Lopes, Dialogic
apidays
TipoTapp For The Customer
TipoTapp For The Customer
Paul Armstrong
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
apidays
TECHTalks - Boston MA - Tim Harney
TECHTalks - Boston MA - Tim Harney
EagleDream Technologies
Migrate-Critical-Workload-to-AWS-From-Domain-Driven-Design-perspective
Migrate-Critical-Workload-to-AWS-From-Domain-Driven-Design-perspective
Amazon Web Services
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...
Amazon Web Services
Learn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stack
Alex Ortiz
Containers for Startups
Containers for Startups
Amazon Web Services
Making the Difficult, Simple(r)
Making the Difficult, Simple(r)
Nordic APIs
Making the Difficult, Simple(r)
Making the Difficult, Simple(r)
Julian Macagno
Making the Difficult, Simple(r)
Making the Difficult, Simple(r)
Ken Tabor
Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020
Elizabeth (Lizzie) Siegle
The Road to a Cloud-First Enterprise
The Road to a Cloud-First Enterprise
Leon Stigter
Similar to 2FA Best Practices
(20)
How to augment On-premise Call Centers to Scale-out to the Cloud
How to augment On-premise Call Centers to Scale-out to the Cloud
Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019
Twilio
Twilio
Keynote_AWS_BecomingAHighFrequencyEnterprise
Keynote_AWS_BecomingAHighFrequencyEnterprise
Scale as an Enabler for Security
Scale as an Enabler for Security
The Future of SaaS is Product Led. Are You Ready?
The Future of SaaS is Product Led. Are You Ready?
AWS Transformation Day - Toronto 2018
AWS Transformation Day - Toronto 2018
APIdays Zurich 2019 - APIs for real time communication Miguel Lopes, Dialogic
APIdays Zurich 2019 - APIs for real time communication Miguel Lopes, Dialogic
TipoTapp For The Customer
TipoTapp For The Customer
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
TECHTalks - Boston MA - Tim Harney
TECHTalks - Boston MA - Tim Harney
Migrate-Critical-Workload-to-AWS-From-Domain-Driven-Design-perspective
Migrate-Critical-Workload-to-AWS-From-Domain-Driven-Design-perspective
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...
Building SRE from Scratch at Coinbase during Hypergrowth (DEV315-S) - AWS re:...
Learn how marketers use APIs to automate their stack
Learn how marketers use APIs to automate their stack
Containers for Startups
Containers for Startups
Making the Difficult, Simple(r)
Making the Difficult, Simple(r)
Making the Difficult, Simple(r)
Making the Difficult, Simple(r)
Making the Difficult, Simple(r)
Making the Difficult, Simple(r)
Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020
The Road to a Cloud-First Enterprise
The Road to a Cloud-First Enterprise
More from Kelley Robinson
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
Kelley Robinson
Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)
Kelley Robinson
Introduction to Public Key Cryptography
Introduction to Public Key Cryptography
Kelley Robinson
Intro to SHAKEN/STIR
Intro to SHAKEN/STIR
Kelley Robinson
Building a Better Scala Community
Building a Better Scala Community
Kelley Robinson
BSides SF - Contact Center Authentication
BSides SF - Contact Center Authentication
Kelley Robinson
Communication @ Startups
Communication @ Startups
Kelley Robinson
Contact Center Authentication
Contact Center Authentication
Kelley Robinson
Authentication Beyond SMS
Authentication Beyond SMS
Kelley Robinson
BSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling Authentication
Kelley Robinson
SIGNAL - Practical Cryptography
SIGNAL - Practical Cryptography
Kelley Robinson
Practical Cryptography
Practical Cryptography
Kelley Robinson
2FA, WTF!?
2FA, WTF!?
Kelley Robinson
2FA WTF
2FA WTF
Kelley Robinson
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Kelley Robinson
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
Kelley Robinson
Practical Cryptography
Practical Cryptography
Kelley Robinson
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
Kelley Robinson
2FA, OTP, WTF?
2FA, OTP, WTF?
Kelley Robinson
Forget what you think you know: Redefining functional programming for Scala
Forget what you think you know: Redefining functional programming for Scala
Kelley Robinson
More from Kelley Robinson
(20)
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)
Introduction to Public Key Cryptography
Introduction to Public Key Cryptography
Intro to SHAKEN/STIR
Intro to SHAKEN/STIR
Building a Better Scala Community
Building a Better Scala Community
BSides SF - Contact Center Authentication
BSides SF - Contact Center Authentication
Communication @ Startups
Communication @ Startups
Contact Center Authentication
Contact Center Authentication
Authentication Beyond SMS
Authentication Beyond SMS
BSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling Authentication
SIGNAL - Practical Cryptography
SIGNAL - Practical Cryptography
Practical Cryptography
Practical Cryptography
2FA, WTF!?
2FA, WTF!?
2FA WTF
2FA WTF
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
Practical Cryptography
Practical Cryptography
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
2FA, OTP, WTF?
2FA, OTP, WTF?
Forget what you think you know: Redefining functional programming for Scala
Forget what you think you know: Redefining functional programming for Scala
Recently uploaded
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
saravananr517913
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
welding defects observed during the welding
welding defects observed during the welding
MuhammadUzairLiaqat
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
null - The Open Security Community
Earthing details of Electrical Substation
Earthing details of Electrical Substation
stephanwindworld
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
Alluxio, Inc.
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Transport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
GOPINATHS437943
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
ssuser2ae721
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
JasonTagapanGulla
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Recently uploaded
(20)
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
welding defects observed during the welding
welding defects observed during the welding
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Earthing details of Electrical Substation
Earthing details of Electrical Substation
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Transport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
2FA Best Practices
1.
2FA BEST PRACTICES How
to secure your applications with Authy TWILIOUSER&DEVELOPERCONFERENCE
2.
KELLEY ROBINSON DEVELOPER EVANGELIST 2FA
BEST PRACTICES How to secure your applications with Authy © 2018 TWILIO, INC. ALL RIGHTS RESERVED. FERDINAND PEREZ SOLUTIONS ARCHITECT
3.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. WHY 2FA?
4.
haveibeenpw n ed.
c om
5.
6.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. 2FA TERMINOLOGY
7.
OTP (ONE TIME
PASSWORD) • Generic term • Single use tokens, usually numeric © 2018 TWILIO, INC. ALL RIGHTS RESERVED.
8.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. WHY IS SMS 2FA "BAD"? • SS7 vulnerabilities • SIM swapping (social engineering) Link: The Post SS7 Future of 2FA
9.
But it's not
perfect SMS 2FA IS BETTER THAN NO 2FA © 2018 TWILIO, INC. ALL RIGHTS RESERVED.
10.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. SMS ALTERNATIVES
11.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. Push
12.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. TOTP (Time-based One Time Passwords)
13.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. 2FA ONBOARDING
14.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
15.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
16.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
17.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
18.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
19.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
20.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
21.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
22.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. 🔓SIGNED IN CONTENT🔓
23.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. 2FA USER EXPERIENCE
24.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
25.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
26.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
27.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED.
28.
© 2018 TWILIO,
INC. ALL RIGHTS RESERVED. ACCOUNT SECURITY SESSIONS AT SIGNAL
29.
LUCAS VIDAL ENGINEERING MANAGER 2FA
IMPLEMENTATION BEST PRACTICES © 2018 TWILIO, INC. ALL RIGHTS RESERVED. JOSH STAPLES SENIOR SALES ENGINEER Dive deeper into 2FA implementation
30.
DAN KILLMER SALES ENGINEERING
MANAGER BUILDING PHONE VERIFICATION AT SCALE Phone verification seems like a simple thing to build on Twilio right? Create a random code, send it via SMS and then check it? Not so fast! © 2018 TWILIO, INC. ALL RIGHTS RESERVED.
31.
SIMON THORPE DIRECTOR, PRODUCT
MARKETING HOW TO AUTHENTICATE CALLERS AND PREVENT SOCIAL ENGINEERING ATTACKS USING TWILIO FLEX © 2018 TWILIO, INC. ALL RIGHTS RESERVED. JULIAN CANTILLO SOFTWARE ENGINEER With Twilio Flex, we have much more modern methods of authentication to simplify not only inbound, but also outbound calls.
32.
KELLEY ROBINSON DEVELOPER EVANGELIST PRACTICAL
CRYPTOGRAPHY Get an introduction to Public Key Cryptography and learn how Twilio uses it inside the Authy app. © 2018 TWILIO, INC. ALL RIGHTS RESERVED.
33.
THANK YOU! TWILIOUSER&DEVELOPERCONFERENCE KELLEY ROBINSON KROBINSON@TWILIO.COM FERDINAND
PEREZ FPEREZ@TWILIO.COM
Download now