loader from loading.io

Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano

Hybrid Identity Protection Podcast

Release Date: 02/24/2022

What You Should Know About Azure AD Security with Dr. Nestori Syynimaa show art What You Should Know About Azure AD Security with Dr. Nestori Syynimaa

Hybrid Identity Protection Podcast

The AADInternals toolkit is a powerful resource for administering and hacking Azure AD. In this episode of the HIP Podcast, Sean talks with Dr. Nestori Syynimaa, AADInternals creator and Sr Principal Security Researcher at Secureworks Counter Threat Unit (CTU). Join them as they discuss how red and blue teams can use the toolkit to explore and improve Azure AD and tenant security—plus the implications of Microsoft’s recent decision to deploy security defaults to all tenants that don’t have conditional access policies in place.

info_outline
Achieving Operational Resilience with Simon Hodgkinson show art Achieving Operational Resilience with Simon Hodgkinson

Hybrid Identity Protection Podcast

Hopefully, your organization has a disaster recovery plan. But do you have a plan for operational resilience? In this HIP Podcast session, Simon Hodgkinson, former CISO at bp and a strategic advisor at Semperis, explains why organizations that focus on operational resilience and disaster recovery are better prepared to weather cyberattacks—and where Active Directory fits into the resiliency picture.

info_outline
Solving the Application Security Challenge with Daniel Stefaniak show art Solving the Application Security Challenge with Daniel Stefaniak

Hybrid Identity Protection Podcast

What do flossing your teeth and combatting application security vulnerabilities have in common? We find out in this session of the HIP Podcast, featuring IAM expert , Senior Product Manager for Identity and Access Management, Domino Data Lab. A former premier field engineer for Azure AD and program manager on the Microsoft Identity product team, Daniel talks with Sean about how a focus on performance over security paves the way for application breaches, combatting multifactor authentication (MFA) fatigue, and how Azure AD handles MFA.

info_outline
Supporting the Identity Pro Community with Ian Glazer show art Supporting the Identity Pro Community with Ian Glazer

Hybrid Identity Protection Podcast

IDPro has become the organization for identity pros looking for career support, development, and all-around comradery. From conducting an annual survey on the “pulse of the industry” to creating an expert Body of Knowledge to developing an IAM-specific certification—the Certified Identity Profession (CIDPRO) program, IDPro offers a wealth of resources for identity pros at every level.  In this session of the HIP Podcast, Sean talks with IDPro founder (and Salesforce Senior VP of Identity Product Management) Ian Glazer about IDPro’s origins and ongoing mission, the importance of...

info_outline
Prescriptive Identity Security for Healthcare Organizations with Marty Momdjian show art Prescriptive Identity Security for Healthcare Organizations with Marty Momdjian

Hybrid Identity Protection Podcast

The life-or-death demands of the healthcare industry complicate identity security. The COVID-19 pandemic, increasing popularity of remote care and Internet of Medical Things (IoMT) devices, and proliferation of ransomware attacks have heightened the healthcare industry’s urgent need for strong hybrid identity security strategies. In this session of the HIP Podcast, Sean talks with Marty Momdjian, Healthcare Solutions Advisor, Sirius Computer Solutions, about the importance of incident preparedness and response plan that meets the unique needs of the business, clinicians, and patients while...

info_outline
So, You’ve Been Breached, What Now? Best Practices for Post-Breach Recovery with Yishai Gerstle show art So, You’ve Been Breached, What Now? Best Practices for Post-Breach Recovery with Yishai Gerstle

Hybrid Identity Protection Podcast

In today’s world, attacks are inevitable, and breaches are probable. The temptation to return to normal operations as quickly as possible is real, but there are significant risks if your recovery simply restores the malware of the original breach. This episode of the HIP Podcast provides real-world, actionable guidance on the right way to recover from Yishai Gerstle, Semperis Security Product Manager, based on his years of incident response, breach prevention, and security solution development.

info_outline
Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More with Brian Desmond show art Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More with Brian Desmond

Hybrid Identity Protection Podcast

What should you tackle first in locking down Active Directory from cyberattacks? In this webinar excerpt, Sean Deuby (Semperis Director of Services) and Brian Desmond (Principal of Ravenswood Technology Group) share tips for five actions you can take now to significantly improve your security posture: 1) implement good identity processes, 2) ensure that trust settings are reviewed to close security gaps, especially in environments with mergers and acquisitions, 3) plan and test your AD backup and recovery strategy, 4) check your Kerberos settings, and 5) deter lateral movement by...

info_outline
From EDR to XDR to Identity with Paul Lanzi show art From EDR to XDR to Identity with Paul Lanzi

Hybrid Identity Protection Podcast

Endpoint detection and response (EDR) is quickly evolving into extended detection and response (XDR). That means that identity is moving to the center of your security approach. In this episode, Paul Lanzi, Co-founder and COO at Remediant, discusses the new capabilities available in XDR solutions and how the ability to gain granular control at the identity level is a game-changer for security teams facing modern threats.

info_outline
Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano show art Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano

Hybrid Identity Protection Podcast

Protection from ransomware often starts with preventing unapproved applications from running on systems. However, the ability to restrict which applications can run is often a difficult process, full of holes and unforeseen vulnerabilities. In this episode of the HIP Podcast, Sean Deuby (Semperis Director of Services) and Alan Sugano, President, ADS Consulting Group, discuss how to develop a successful strategy for designating allowed applications to increase security and dramatically reduce risk.

info_outline
Defining the Decision-Making Process for Cyberattack Incident Response with Benjamin Cauwel show art Defining the Decision-Making Process for Cyberattack Incident Response with Benjamin Cauwel

Hybrid Identity Protection Podcast

When cybercriminals take down your organization, you might have your technical response plan locked and loaded. But who's calling the shots on when to bring the network offline for remediation efforts? Especially in multinational organizations, the decision-making process for cyberattack incident response isn't always clearly defined. Any confusion about who makes critical decisions will hinder a fast response. As a follow-on to a about developing a technical response plan to a cyberattack, Sean Deuby chats with Benjamin Cauwel (Accenture Senior Security Manager) about how organizations can...

info_outline
 
More Episodes

Protection from ransomware often starts with preventing unapproved applications from running on systems. However, the ability to restrict which applications can run is often a difficult process, full of holes and unforeseen vulnerabilities. In this episode of the HIP Podcast, Sean Deuby (Semperis Director of Services) and Alan Sugano, President, ADS Consulting Group, discuss how to develop a successful strategy for designating allowed applications to increase security and dramatically reduce risk.