Podcast
The Hybrid Identity Protection (HIP) Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments from cyberattacks. Hosted by 15-year MVP alumnus Sean Deuby, the podcast includes conversations with global identity experts who share their strategic visions and practical guidelines for securing Active Directory and Entra ID, preventing and remediating identity-based attacks, and recovering from identity system attacks.
The Hidden Dangers of AD CS with Jake Hildreth, Principal Security Consultant at Semperis
This episode features Jake Hildreth, Principal Security Consultant at Semperis. With nearly 25 years of IT experience, Jake has seen…
All Podcast Episodes
Explore conversations with global identity security experts about securing hybrid cloud identities, including Active Directory, Entra ID, and Okta.
The Hidden Dangers of AD CS with Jake Hildreth, Principal Security Consultant at Semperis
This episode features Jake Hildreth, Principal Security Consultant at Semperis. With nearly 25 years of IT experience, Jake has seen how …
When Change Becomes the Biggest Threat with Edward Amoroso, CEO of TAG Infosphere
This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer. With decades of experience securing complex …
Getting Rid of ADFS featuring Sander Berkouwer
Sean is joined by identity expert Sander Berkouwer to explore the evolving landscape of enterprise authentication. Active Directory Federation Services …
One Account, $1.4 Billion: Inside the Merck NotPetya Breach with Lance Peterman, CIDPRO
The 2017 NotPetya cyberattack remains one of the most devastating and costly breaches in history, inflicting over $1.4 billion in …
CISOs Are the Top of the Information Security Food Chain with Allan Alford
In this time of constant cyberattacks and increased cybersecurity reporting requirements, a CISO’s job is no easy task and typically …
Where IAM Is Heading with Joe Kaplan
How is IAM—and the role of the identity security professional—adapting to meet the challenges of today’s threat landscape? In this …