Resources
HIP community members believe that education is our strongest defense. Explore past conference sessions, keynotes, panels, and more from the world’s premier identity security experts.
Huzzah! 2025 sessions are now available.
Refresh your understanding of hybrid Active Directory security challenges and incident response strategies, with practical tips for minimizing panic during cyber incidents.
Through live demos, Microsoft MVP Christopher Brumm shows how you can implement granular access controls, privileged identity management, and access packages for partners and consultants, while maintaining high security standards.
This discussion—featuring HIP Community experts Jorge De Almeida Pinto, Eric Woodruff, Michael Van Horenbeeck, Christopher Brumm, and Alex Weinert—reminds you that most attacks still use traditional methods, so the basic security hygiene you already practice is crucial.
In this panel discussion, discover how ransomware has profoundly changed disaster recovery and why true cyber resilience requires collaboration between IT operations, identity, and cybersecurity teams, with stress-resistant leadership empowered to make critical decisions quickly.
In this HIP Conf session, Tim Wolf, Senior Solution Architect at Semperis, discusses the challenges of traditional PAW implementations and explores how modern PAW approaches offer greater flexibility and easier management while maintaining Zero Trust principles.
Token theft attacks—which enable attackers to impersonate users even in environments with strong authentication—are on the rise. Fortunately, Entra ID has built-in protections. Discover how to use them, how threat actors also leverage them, and how to detect such abuse.
True: You can’t get rid of NTLM in 30 minutes. The entire process typically takes months or even years. But in 30 minutes, you can learn invaluable tips for removing NTLM quickly but precisely. Get the method and toolkit in this HIP Conf session.
In an era where artificial intelligence is both a weapon and a shield, cybersecurity leaders must rethink their defenses. Microsoft EMEA Chief Security Advisor Simone Pezzoli explores how AI is reshaping the identity threat landscape and how proactive identity orchestration neutralizes the most sophisticated exploits.
Microsoft Security expert and MVP Ru Campbell has worked across hundreds of Microsoft 365 and Entra ID tenants while building a multi-tenant cloud security posture management (CSPM) platform. This session distills practical lessons from that experience. Leave with a focused, immediately actionable set of high-impact security changes that you can apply to your own tenants.
Active Directory expert Christoffer Andersson delivers an in-depth technical presentation and practical security demonstration on the internal workings of Active Directory, clarifying common misconceptions and demonstrating advanced troubleshooting techniques.
Privileged Identity Management is key in a Zero Trust environment, but it’s not a plug-and-play solution. In this session, learn how to avoid common pitfalls and how administrators can unlock the full potential of PIM. Leave with best practices to enhance control and security in your daily operations.
Application security in Entra ID is an essential part of your identity and access management processes. Through the lens of real-world breaches, Sander Berkauer and Raymond Convalius how Entra ID applications work, risks of misconfiguration, and why everything is becoming an app-based identity.