Access Management , Digital Identity , Finance & Banking

Password Management: The First Line of Defense

Vikas Malhotra of LastPass on Ways to Transition From Password to Passwordless
Vikash Malhotra, country manager, LastPass

Vikas Malhotra, country manager, LastPass, discusses establishing a password management program as the first line of defense in establishing user identity, followed by 2FA and MFA as the second step in the protection process.

See Also: Xi'an Jiaotong-Liverpool University Drives Pageviews with Cloudflare Performance

Malhotra elaborates on how the password management program plays a critical role in the security and identity stack. The password manager brings in the ability of an encrypted vault to protect the applications, and the user can access applications from behind the vault, says Vikas Malhotra, country manager, LastPass.

In a video interview with Information Security Media Group at ISMG's Cybersecurity Summit in New Delhi, Malhotra discusses:

  • How CISOs can transition from a password to a passwordless environment;
  • Role of single sign-on in establishing federal identity;
  • How does password management program help commoditize authentication and authorization.

Malhotra is the country manager at LastPass, where he is responsible for building and leading the business in India and SAARC. He has more than 20 years of IT industry experience and has also held leadership positions at Wipro, Symantec, Oracle, and LogMeIn.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.