Speed, Scale & Stealth: Attackers' ATO Tools or Obstacle - Your Choice

Any organization with value behind the login page can be exploited through an account takeover (ATO) attack. Attackers have tools and techniques for an ATO attack, with speed, scale, and stealth to attack before you even realize that damage has occurred.

In this talk, you will see how bots enable attackers to orchestrate large-scale ATO attacks, multiplying the potential damage using stealthiness to bypass defenses and remain undetected. We will then equip you with proactive measures to disrupt the speed, scale, and stealth elements of potential ATO incidents with a few simple steps using Amazon Cloudfront and Lambda @ Edge.

Samrat Karak - Amazon Web Services
Frank Walsh - HUMAN Security