loader from loading.io

Protecting Privileged Identities and DevOps Pipelines in Microsoft Azure with Thomas Naunheim

Hybrid Identity Protection Podcast

Release Date: 12/02/2021

Solving the Application Security Challenge with Daniel Stefaniak show art Solving the Application Security Challenge with Daniel Stefaniak

Hybrid Identity Protection Podcast

What do flossing your teeth and the combatting application security vulnerabilities have in common? We find out in this session of the IP Podcast, featuring IAM expert , Senior Product Manager for Identity and Access Management, Domino Data Lab. A former program manager on the identity product and Azure AD team, Daniel talks with Sean about how a focus on performance over security paves the way for application breaches, combatting multifactor authentication (MFA) fatigue, and how Azure AD handles MFA.

info_outline
Supporting the Identity Pro Community with Ian Glazer show art Supporting the Identity Pro Community with Ian Glazer

Hybrid Identity Protection Podcast

IDPro has become the organization for identity pros looking for career support, development, and all-around comradery. From conducting an annual survey on the “pulse of the industry” to creating an expert Body of Knowledge to developing an IAM-specific certification—the Certified Identity Profession (CIDPRO) program, IDPro offers a wealth of resources for identity pros at every level.  In this session of the HIP Podcast, Sean talks with IDPro founder (and Salesforce Senior VP of Identity Product Management) Ian Glazer about IDPro’s origins and ongoing mission, the importance of...

info_outline
Prescriptive Identity Security for Healthcare Organizations with Marty Momdjian show art Prescriptive Identity Security for Healthcare Organizations with Marty Momdjian

Hybrid Identity Protection Podcast

The life-or-death demands of the healthcare industry complicate identity security. The COVID-19 pandemic, increasing popularity of remote care and Internet of Medical Things (IoMT) devices, and proliferation of ransomware attacks have heightened the healthcare industry’s urgent need for strong hybrid identity security strategies. In this session of the HIP Podcast, Sean talks with Marty Momdjian, Healthcare Solutions Advisor, Sirius Computer Solutions, about the importance of incident preparedness and response plan that meets the unique needs of the business, clinicians, and patients while...

info_outline
So, You’ve Been Breached, What Now? Best Practices for Post-Breach Recovery with Yishai Gerstle show art So, You’ve Been Breached, What Now? Best Practices for Post-Breach Recovery with Yishai Gerstle

Hybrid Identity Protection Podcast

In today’s world, attacks are inevitable, and breaches are probable. The temptation to return to normal operations as quickly as possible is real, but there are significant risks if your recovery simply restores the malware of the original breach. This episode of the HIP Podcast provides real-world, actionable guidance on the right way to recover from Yishai Gerstle, Semperis Security Product Manager, based on his years of incident response, breach prevention, and security solution development.

info_outline
Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More with Brian Desmond show art Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More with Brian Desmond

Hybrid Identity Protection Podcast

What should you tackle first in locking down Active Directory from cyberattacks? In this webinar excerpt, Sean Deuby (Semperis Director of Services) and Brian Desmond (Principal of Ravenswood Technology Group) share tips for five actions you can take now to significantly improve your security posture: 1) implement good identity processes, 2) ensure that trust settings are reviewed to close security gaps, especially in environments with mergers and acquisitions, 3) plan and test your AD backup and recovery strategy, 4) check your Kerberos settings, and 5) deter lateral movement by...

info_outline
From EDR to XDR to Identity with Paul Lanzi show art From EDR to XDR to Identity with Paul Lanzi

Hybrid Identity Protection Podcast

Endpoint detection and response (EDR) is quickly evolving into extended detection and response (XDR). That means that identity is moving to the center of your security approach. In this episode, Paul Lanzi, Co-founder and COO at Remediant, discusses the new capabilities available in XDR solutions and how the ability to gain granular control at the identity level is a game-changer for security teams facing modern threats.

info_outline
Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano show art Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano

Hybrid Identity Protection Podcast

Protection from ransomware often starts with preventing unapproved applications from running on systems. However, the ability to restrict which applications can run is often a difficult process, full of holes and unforeseen vulnerabilities. In this episode of the HIP Podcast, Sean Deuby (Semperis Director of Services) and Alan Sugano, President, ADS Consulting Group, discuss how to develop a successful strategy for designating allowed applications to increase security and dramatically reduce risk.

info_outline
Defining the Decision-Making Process for Cyberattack Incident Response with Benjamin Cauwel show art Defining the Decision-Making Process for Cyberattack Incident Response with Benjamin Cauwel

Hybrid Identity Protection Podcast

When cybercriminals take down your organization, you might have your technical response plan locked and loaded. But who's calling the shots on when to bring the network offline for remediation efforts? Especially in multinational organizations, the decision-making process for cyberattack incident response isn't always clearly defined. Any confusion about who makes critical decisions will hinder a fast response. As a follow-on to a about developing a technical response plan to a cyberattack, Sean Deuby chats with Benjamin Cauwel (Accenture Senior Security Manager) about how organizations can...

info_outline
Active Directory Disaster Recovery Revisited for 2022 with Guido Grillenmeier and Gil Kirkpatrick show art Active Directory Disaster Recovery Revisited for 2022 with Guido Grillenmeier and Gil Kirkpatrick

Hybrid Identity Protection Podcast

What has changed about Active Directory disaster recovery since Gil Kirkpatrick and Guido Grillenmeier—aka the "Masters of Disaster"—first wrote the book on how to recover AD from scratch in "The Definitive Guide to Active Directory Disaster Recovery"? In this session, Sean Deuby leads a discussion with Kirkpatrick and Grillenmeier about the monumental changes in the DR landscape with the onslaught of cyberattacks that target Active Directory, which has exponentially raised the risk level for organizations that don't have a tested AD DR plan in place. In this episode, these AD experts...

info_outline
Protecting Your Organization from Third-Party Security Risks with Heinrich Smit show art Protecting Your Organization from Third-Party Security Risks with Heinrich Smit

Hybrid Identity Protection Podcast

In this session, Sean Deuby discusses third-party security risks with Heinrich Smit, Semperis Deputy CISO, whose extensive experience includes developing and implementing end-to-end security solutions for large financial organizations. Smit offers a global perspective on supply-chain dynamics and practical tips for protecting your organization from potential risks associated with third-party vendors.

info_outline
 
More Episodes
In a cloud environment, securing privileged identities and DevOps pipelines with privileged access requires special attention. In this session, Sean Deuby and Gil Kirkpatrick (Semperis Chief Architect) discuss Microsoft's current guidance for securing privileged access in Microsoft Azure with Thomas Naunheim (Cloud Architect at glueckkanja-gab AG). They cover how to design a secure foundation for privileged identities, including how to prevent privilege escalation by implementing a well-designed and delegated Azure RBAC model.