Nov 16th, 11am PT/ 2PM ET
After the Breach:
Perspectives from Cybersecurity Visionaries

After a data breach, cybercriminals will often test compromised credentials on third party websites and mobile apps in what is known as credential stuffing attacks. Because password reuse is so common, credential stuffing attacks are responsible for more than $10 billion in fraud losses, identity theft, and brand damage every year.

On November 16th, join Ted Schlein, General Partner at Kleiner Perkins, Sarah Squire, co-author of NIST Digital Identity Guidelines, and former OWASP Chairman Michael Coates to hear their thoughts on credential stuffing, the criminal ecosystem, and how the industry can better defend itself against third party data breaches.


Michael Coates
Board Member, OWASP
Michael is the former chairman and current member of the Global Board of Directors of the OWASP Foundation, the largest open source application security community. Previously, Michael was at Mozilla where he built and led the security assurance program to protect nearly half a billion Firefox users, Mozilla web applications, and infrastructure. Throughout his career, Michael has advised major corporations and governments on secure architecture and software security.
Ted Schlein
General Partner, Kleiner Perkins
Ted joined Kleiner Perkins in 1996 and focuses on early-stage technology companies in the enterprise software and infrastructure markets, including ventures within the networking and consumer security arenas. Before Kleiner Perkins, Ted was the founding CEO of Fortify Software, now an HP company.
Sarah Squire
Founder, Engage Identity
Sarah is the Founder and Principal Consultant at Engage Identity. She was named one of the top 100 leaders in identity by OWI. She is a coauthor of the NIST Digital Identity Guidelines, SP 800-63 and has acted as a subject matter expert in identity and access management to several open standards groups, including OpenID Foundation and the Internet Engineering Task Force.