loader from loading.io

Weaning Yourself Away From GUI-Based AD Administration

Hybrid Identity Protection Podcast

Release Date: 07/17/2020

Common Misconceptions About Azure AD Backup and Recovery with Doug Davis show art Common Misconceptions About Azure AD Backup and Recovery with Doug Davis

Hybrid Identity Protection Podcast

In this HIP Podcast session, Sean and AD expert Doug Davis discuss some common misconceptions about Azure AD backup and recovery. Spoiler alert: the Azure AD Recycle Bin won't save you if your Azure AD resources get wiped out.

info_outline
The Active Directory Connection in Exchange Attacks, Wiper Attacks, and the Kaseya Attacks show art The Active Directory Connection in Exchange Attacks, Wiper Attacks, and the Kaseya Attacks

Hybrid Identity Protection Podcast

In this excerpt from a web seminar, Sean and Michele Crockett (Semperis Senior Director of Product Marketing) dive into the tight link between Exchange Server and Active Directory (and how to guard against attacks like the Hafnium breach), the resurgence of wiper attacks like MeteorExpress that cripple business operations, and the Kaseya attacks that exploited automatic product updates.

info_outline
The COBOL Challenge: Who Will Maintain Legacy Systems? With Orin Thomas show art The COBOL Challenge: Who Will Maintain Legacy Systems? With Orin Thomas

Hybrid Identity Protection Podcast

In this session, Sean Deuby talks with Orin Thomas, Microsoft Principal Cloud Advocate, about this phenomenon (which he calls the "COBOL challenge"), how IT pros can beef up their Active Directory skills, and a preview of the forthcoming Microsoft Windows Server Hybrid Administrator Associate certification.

info_outline
Defending Against PrintNightmare and PetitPotam Vulnerabilities show art Defending Against PrintNightmare and PetitPotam Vulnerabilities

Hybrid Identity Protection Podcast

In this session excerpted from a web seminar, Sean Deuby (Semperis Director of Services) and Michele Crockett (Semperis Senior Director of Product Marketing) discuss two important Microsoft security flaws: the Windows Print Spooler vulnerability called PrintNightmare and the PetitPotam flaw. Sean gives some background on how cybercriminals exploit these flaws, how they came to light, and what you can do to guard against them.

info_outline
Managing Security in Active Directory vs Azure Active Directory with Doug Davis show art Managing Security in Active Directory vs Azure Active Directory with Doug Davis

Hybrid Identity Protection Podcast

Recent cyberattacks (including the SolarWinds breach) have involved gaining entry into on-premises Active Directory and then moving to Azure Active Directory (or vice versa) to infiltrate the environment. Sean chats with Doug Davis (Semperis Senior Product Manager) about the differences in managing security in a hybrid identity environment. Doug shares his top 5 tips for closing common attack paths that move between on-premises AD and Azure Active Directory.

info_outline
Breaking Down Microsoft Security Offerings with Alexander Benoit show art Breaking Down Microsoft Security Offerings with Alexander Benoit

Hybrid Identity Protection Podcast

Sean talks with Alexander Benoit, CEO of dinext pi-sec, about how Microsoft security offerings have changed with the company's adoption of the extended detection and response (XDR) approach. Benoit, who has a deep understanding of Microsoft infrastructures, breaks down the Microsoft 365 Defender suite and gives his perspective on Microsoft positioning itself as a security company.

info_outline
Emerging Trends in Securing Digital Identities with Julie Smith of IDSA  show art Emerging Trends in Securing Digital Identities with Julie Smith of IDSA

Hybrid Identity Protection Podcast

How have identity security practices changed in the last year? Sean chats with Julie Smith, executive director of the Identity Defined Security Alliance (IDSA), about the organization's newly released "2021 Trends in Securing Digital Identities" report. In addition to tracking the increase in managing remote workers and assets during the pandemic, the report captures the rising concern among IT and security teams about whether current security strategies are equipped to meet the moment.

info_outline
What to Do Before, During, and After a Cyberattack with Ben Cauwel of Accenture show art What to Do Before, During, and After a Cyberattack with Ben Cauwel of Accenture

Hybrid Identity Protection Podcast

What's the worst time to plan for a cyberattack? When you're actively under attack. Sean talks with Ben Cauwel, Senior AD Security Delivery Manager at Accenture France, about putting together a functional, tested incident response plan for before, during, and after a cyberattack. The key is to use the time when the systems are running properly to plan for the worst.

info_outline
The Future of Identity | LIVE Panel from HIP Europe 2021 show art The Future of Identity | LIVE Panel from HIP Europe 2021

Hybrid Identity Protection Podcast

Are passwords really dead? Tune in to this lively conversation among some of the leading luminaries of identity and access management as they debate challenges and solutions of managing access to systems and data in an escalating threat landscape. Moderated by Semperis Chief Architect Gil Kirkpatrick, "The Future of Identity" includes perspectives from John Craddock. Pam Dingle, Ulf Simon-Weidner, Guido Grillenmeier, and Ben Cauwel.

info_outline
Is Cloud Security an Oxymoron? | LIVE Panel from HIP Europe 2021 show art Is Cloud Security an Oxymoron? | LIVE Panel from HIP Europe 2021

Hybrid Identity Protection Podcast

This lively conversation covers the evolution of enterprise trust in cloud security: Cloud providers Microsoft, AWS, and Google, deliver compelling platforms that are gradually winning the hearts and minds of enterprise customers, but recent successful breaches of cloud services by threat actors have started to erode that trust. Listen as these experienced identity management experts discuss the current challenges with cloud security. 

info_outline
 
More Episodes

Continuous learning when it comes to being an AD Admin is a requirement as they’re tasked with adapting to maintain relevancy. Mike Kanakos (Senior Systems Engineer in IAM at Align Systems), discusses his path to automating tasks and tips for becoming less dependent on the GUI for Active Directory management, including the 5 Core AD Management PowerShell Cmdlets.