loader from loading.io

Battling Hafnium & Microsoft Exchange Exploits with Alan Sugano

Hybrid Identity Protection Podcast

Release Date: 04/15/2021

The Power of Azure Sentinel with Rod Trent show art The Power of Azure Sentinel with Rod Trent

Hybrid Identity Protection Podcast

In this episode, Sean is joined by Doug Davis (Semperis Senior Product Manager) and Rod Trent (Microsoft Security Cloud Solution Architect and Global Azure Sentinel SME) for a deep dive on Azure Sentinel, the Microsoft cloud-native security information and event manager (SIEM). Sentinel is used to monitor and analyze a variety of environments: Listen in for tips on how Sentinel can help strengthen your identity system security posture.

info_outline
Evolving Security Teams in the Zero Trust Era with CISO Jim Doggett show art Evolving Security Teams in the Zero Trust Era with CISO Jim Doggett

Hybrid Identity Protection Podcast

The role of the identity team in an organization has evolved over time, becoming a central component of the security infrastructure in the era of Zero Trust. But have organizations' security team structures evolved to recognize this shift? Drawing from his experience as former CISO for Kaiser Permanente and other roles, Jim Doggett discusses how organizations can change their approach to security to better manage risk.

info_outline
Battling Hafnium & Microsoft Exchange Exploits with Alan Sugano show art Battling Hafnium & Microsoft Exchange Exploits with Alan Sugano

Hybrid Identity Protection Podcast

The attacks on Microsoft Exchange Server around the world by Hafnium have affected tens of thousands of organizations. In this session, Semperis Director of Services Sean Deuby talks with Alan Sugano, president of ADS Consulting Group, who has been on the front lines helping clients patch and recover from the attack. Alan provides practical, step-by-step instructions for using the Microsoft Safety Scanner to look for Indicators of Compromise (IOCs) and patch systems.

info_outline
Identifying Gaps in Your AD Recovery Plan show art Identifying Gaps in Your AD Recovery Plan

Hybrid Identity Protection Podcast

Sean is joined by Alexandra Weaver (Semperis Solutions Architect) to discuss Active Directory forest recovery in the context of a comprehensive Business Continuity and Disaster Recovery (BCDR) strategy, including how to identify gaps in the plan. For example, do you have a tested plan in place to bring systems online when no DC is available? Listen in for tips on how to cover common AD recovery gaps.

info_outline
Breaking Down Identity Updates From Microsoft Ignite with Doug Davis show art Breaking Down Identity Updates From Microsoft Ignite with Doug Davis

Hybrid Identity Protection Podcast

Are passwords dead? In this session, Sean Deuby and Doug Davis (Semperis, Senior Product Manager) discuss Microsoft's recent announcements at Ignite about passwordless authentication, a new concept called Temporary Access Pass, increased integration of Hello for Business provisioning, and other initiatives Microsoft is pursuing to shore up security of its products in the wake of proliferating cyberattacks that target authentication services.

info_outline
Securing Your Legacy Apps with Roelf Zomerman show art Securing Your Legacy Apps with Roelf Zomerman

Hybrid Identity Protection Podcast

Sean is joined by Microsoft Cloud Solution Architect, Roelf Zomerman, to discuss the user benefits of having both on-premises + cloud apps in one portal and the different ways you can integrate your legacy on-premises applications with identity services such as Azure AD and Okta.

info_outline
Future Proofing Identity Security Panel with Julie Smith, Siddharth Bhai, and Gil Kirkpatrick show art Future Proofing Identity Security Panel with Julie Smith, Siddharth Bhai, and Gil Kirkpatrick

Hybrid Identity Protection Podcast

Looking towards tomorrow’s best identity security practices based on the evolving landscape of today, this panel discussion dives into identity access management, securing remote workforces, changes in authorization, and beyond.

info_outline
Hacking Identity Panel with Chris Roberts, Wim van den Heijkant, and David Raviv show art Hacking Identity Panel with Chris Roberts, Wim van den Heijkant, and David Raviv

Hybrid Identity Protection Podcast

Flashback with us to the Hacking Identity panel from the third-annual HIP Conference, as guest host David Raviv (founder of the New York Information Security Meetup) is joined by one of the world’s foremost experts on counter threat intelligence, Chris Roberts and Fortigi co-founder and security consultant, Wim van den Heijkant.

info_outline
Hybrid Identity Security Panel with Brian Desmond, Joe Kaplan, and Jorge de Almeida Pinto show art Hybrid Identity Security Panel with Brian Desmond, Joe Kaplan, and Jorge de Almeida Pinto

Hybrid Identity Protection Podcast

What does efficient hybrid identity protection look like? Are you under the impression that your organization is too large to go passwordless? In this live session from our annual HIP Conference, the panelists share their individual experiences with methods for managing identities among varying IT infrastructures.

info_outline
Crisis Management Panel with Jules Okafor, Kat Sweet, and Guido Grillenmeier show art Crisis Management Panel with Jules Okafor, Kat Sweet, and Guido Grillenmeier

Hybrid Identity Protection Podcast

While companies face the advent of widespread ransomware attacks, they must be well prepared with readied crisis management planning. A cybersecurity solutions visionary, a technical evangelist, and a few Microsoft MVP's join forces in this episode to discuss that and more.

info_outline
 
More Episodes

The attacks on Microsoft Exchange Server around the world by Hafnium have affected tens of thousands of organizations. In this session, Semperis Director of Services Sean Deuby talks with Alan Sugano, president of ADS Consulting Group, who has been on the front lines helping clients patch and recover from the attack. Alan provides practical, step-by-step instructions for using the Microsoft Safety Scanner to look for Indicators of Compromise (IOCs) and patch systems. Key takeaway: Traditional anti-virus programs will NOT uncover this malware.

Resources:

Safety Scanner for Microsoft

Purple Knight

TRUSEC Blog

Huntress Blog