Building a secure user authentication story
Regular Session
Data breaches are inevitable. We should build our applications under the assumption that it's only a matter of time before our data is breached. In this session, we'll cover some techniques and best practices for handling user authentication in a secure manner, along with covering proper user flow, including user registration, logging in, and password resets. At the end of this session, you'll be armed with the knowledge to feel confident in the security of your authentication story.