Overview: This session will provide a status update on our current use of MFA providers—Duo and Microsoft—highlighting adoption progress, integration challenges, and user experience feedback. We’ll explore the roadmap for the next 6 to 12 months, including planned enhancements, policy shifts, and anticipated changes in authentication workflows.
Key Topics:
Current State of MFA Deployment
– Usage metrics and coverage for Duo and Microsoft MFA
– Integration with key systems and applications
– Lessons learned and user feedback
Strategic Outlook (6–12 Months)
– Consolidation or expansion of MFA providers
– Alignment with Zero Trust and identity governance initiatives
– Upcoming compliance or regulatory considerations
MFA Methods: Present and Future
– Overview of currently supported methods (e.g., SMS, push notifications, OTP, biometrics)
– Emerging technologies: Passkeys, FIDO2, and device-bound credentials
– Considerations for accessibility and user convenience
Passkeys: Configuration and Usage
– What passkeys are and how they differ from traditional MFA
– Steps for configuring passkeys in Microsoft and compatible platforms
– Use cases, benefits, and potential challenges
About this event:
Presenters:
- Jeremy Watson, Manager, IAM, Technology Services
- Devin Gengelbach, Principle IAM Specialist, Technology Services
- Erik Coleman, IAM Architect, Technology Services
Track:
Reroute to Efficiency — Streamline processes at warp speed to reduce complexity and improve operations.
Experience Needed:
Beginner
Learning Outcome:
Attendees will leave with a clear understanding of where we stand with MFA, what’s coming next, and how new authentication methods like passkeys will shape our security posture.
Additional Keywords:
MFA, Duo, Microsoft Authenticator, Authentication