Protecting Privileged Identities and DevOps Pipelines in Microsoft Azure with Thomas Naunheim
Hybrid Identity Protection Podcast
Release Date: 12/02/2021
Hybrid Identity Protection Podcast
What do flossing your teeth and the combatting application security vulnerabilities have in common? We find out in this session of the IP Podcast, featuring IAM expert , Senior Product Manager for Identity and Access Management, Domino Data Lab. A former program manager on the identity product and Azure AD team, Daniel talks with Sean about how a focus on performance over security paves the way for application breaches, combatting multifactor authentication (MFA) fatigue, and how Azure AD handles MFA.
info_outlineHybrid Identity Protection Podcast
IDPro has become the organization for identity pros looking for career support, development, and all-around comradery. From conducting an annual survey on the “pulse of the industry” to creating an expert Body of Knowledge to developing an IAM-specific certification—the Certified Identity Profession (CIDPRO) program, IDPro offers a wealth of resources for identity pros at every level. In this session of the HIP Podcast, Sean talks with IDPro founder (and Salesforce Senior VP of Identity Product Management) Ian Glazer about IDPro’s origins and ongoing mission, the importance of...
info_outlineHybrid Identity Protection Podcast
The life-or-death demands of the healthcare industry complicate identity security. The COVID-19 pandemic, increasing popularity of remote care and Internet of Medical Things (IoMT) devices, and proliferation of ransomware attacks have heightened the healthcare industry’s urgent need for strong hybrid identity security strategies. In this session of the HIP Podcast, Sean talks with Marty Momdjian, Healthcare Solutions Advisor, Sirius Computer Solutions, about the importance of incident preparedness and response plan that meets the unique needs of the business, clinicians, and patients while...
info_outlineHybrid Identity Protection Podcast
In today’s world, attacks are inevitable, and breaches are probable. The temptation to return to normal operations as quickly as possible is real, but there are significant risks if your recovery simply restores the malware of the original breach. This episode of the HIP Podcast provides real-world, actionable guidance on the right way to recover from Yishai Gerstle, Semperis Security Product Manager, based on his years of incident response, breach prevention, and security solution development.
info_outlineHybrid Identity Protection Podcast
What should you tackle first in locking down Active Directory from cyberattacks? In this webinar excerpt, Sean Deuby (Semperis Director of Services) and Brian Desmond (Principal of Ravenswood Technology Group) share tips for five actions you can take now to significantly improve your security posture: 1) implement good identity processes, 2) ensure that trust settings are reviewed to close security gaps, especially in environments with mergers and acquisitions, 3) plan and test your AD backup and recovery strategy, 4) check your Kerberos settings, and 5) deter lateral movement by...
info_outlineHybrid Identity Protection Podcast
Endpoint detection and response (EDR) is quickly evolving into extended detection and response (XDR). That means that identity is moving to the center of your security approach. In this episode, Paul Lanzi, Co-founder and COO at Remediant, discusses the new capabilities available in XDR solutions and how the ability to gain granular control at the identity level is a game-changer for security teams facing modern threats.
info_outlineHybrid Identity Protection Podcast
Protection from ransomware often starts with preventing unapproved applications from running on systems. However, the ability to restrict which applications can run is often a difficult process, full of holes and unforeseen vulnerabilities. In this episode of the HIP Podcast, Sean Deuby (Semperis Director of Services) and Alan Sugano, President, ADS Consulting Group, discuss how to develop a successful strategy for designating allowed applications to increase security and dramatically reduce risk.
info_outlineHybrid Identity Protection Podcast
When cybercriminals take down your organization, you might have your technical response plan locked and loaded. But who's calling the shots on when to bring the network offline for remediation efforts? Especially in multinational organizations, the decision-making process for cyberattack incident response isn't always clearly defined. Any confusion about who makes critical decisions will hinder a fast response. As a follow-on to a about developing a technical response plan to a cyberattack, Sean Deuby chats with Benjamin Cauwel (Accenture Senior Security Manager) about how organizations can...
info_outlineHybrid Identity Protection Podcast
What has changed about Active Directory disaster recovery since Gil Kirkpatrick and Guido Grillenmeier—aka the "Masters of Disaster"—first wrote the book on how to recover AD from scratch in "The Definitive Guide to Active Directory Disaster Recovery"? In this session, Sean Deuby leads a discussion with Kirkpatrick and Grillenmeier about the monumental changes in the DR landscape with the onslaught of cyberattacks that target Active Directory, which has exponentially raised the risk level for organizations that don't have a tested AD DR plan in place. In this episode, these AD experts...
info_outlineHybrid Identity Protection Podcast
In this session, Sean Deuby discusses third-party security risks with Heinrich Smit, Semperis Deputy CISO, whose extensive experience includes developing and implementing end-to-end security solutions for large financial organizations. Smit offers a global perspective on supply-chain dynamics and practical tips for protecting your organization from potential risks associated with third-party vendors.
info_outline