After the Breach:
Perspectives from Cybersecurity Visionaries

After a password breach, cybercriminals typically test the compromised credentials on other websites and mobile apps in what is known as a credential stuffing attack. Because password reuse is so common, credential stuffing attacks are responsible for more than $10 billion in fraud losses, identity theft, and brand damages every year.

Watch a panel discussion of esteemed security leaders to hear their thoughts on credential stuffing, the criminal ecosystem, and how the industry can better defend itself against third party data breaches.

Kevin Mandia
President and CEO, FireEye
As FireEye President and CEO, Kevin has overseen all operations since December 2013, when FireEye acquired his company, Mandiant. Before Mandiant, Kevin was the Director of Computer Forensics at Foundstone (acquired by McAfee Corporation), and the Director of Information Security for Sytex (later acquired by Lockheed Martin). Kevin was also a United States Air Force Officer and a special agent in the Air Force Office of Special Investigations (AFOSI).
Ted Schlein
General Partner, Kleiner Perkins
Ted joined Kleiner Perkins in 1996 and focuses on early-stage technology companies in the enterprise software and infrastructure markets, including ventures within the networking and consumer security arenas. Before Kleiner Perkins, Ted was the founding CEO of Fortify Software, now an HP company.
Sarah Squire
Founder, Engage Identity
Sarah is the Founder and Principal Consultant at Engage Identity. She was named one of the top 100 leaders in identity by OWI. She is a coauthor of the NIST Digital Identity Guidelines, SP 800-63 and has acted as a subject matter expert in identity and access management to several open standards groups, including OpenID Foundation and the Internet Engineering Task Force.
Michael Coates
Board Member, OWASP
Michael is the former chairman and current member of the Global Board of Directors of the OWASP Foundation, the largest open source application security community. Previously, Michael was at Mozilla where he built and led the security assurance program to protect nearly half a billion Firefox users, Mozilla web applications, and infrastructure. Throughout his career, Michael has advised major corporations and governments on secure architecture and software security.