The role of the identity team in an organization has evolved over time, becoming a central component of the security infrastructure in the era of Zero Trust. But have organizations’ security team structures evolved to recognize this shift? In this session, Sean Deuby, Semperis Director of Services, is joined by Jim Doggett, Semperis CISO, and a longtime expert in information security as well as risk and controls. Drawing from his experience as former CISO for Kaiser Permanente and other roles, Doggett discusses how organizations can change their approach to security to better manage risk.
This episode features Dr. Chase Cunningham, Chief Strategy Officer at Demo-Force.com. Widely known as “Dr. Zero Trust”, he’s the creator …
This episode features Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity. A founding member of Cohesity’s Security Center of …
This episode features Chris Inglis, former U.S. National Cyber Director and longtime Deputy Director of the NSA. With over 40 years …
This episode features Jake Hildreth, Principal Security Consultant at Semperis. With nearly 25 years of IT experience, Jake has seen how …
This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer. With decades of experience securing complex …
Sean is joined by identity expert Sander Berkouwer to explore the evolving landscape of enterprise authentication. Active Directory Federation Services …
The 2017 NotPetya cyberattack remains one of the most devastating and costly breaches in history, inflicting over $1.4 billion in …
In this time of constant cyberattacks and increased cybersecurity reporting requirements, a CISO's job is no easy task and typically …
How is IAM—and the role of the identity security professional—adapting to meet the challenges of today's threat landscape? In this …
Microsoft describes its Detection and Response Team (DART) as the "cybersecurity team we hope you never meet." In this episode of the HIP Podcast, Sean speaks with Shiva P, a Senior Consultant with Microsoft DART. Together, they delve into the tactics used by threat actors and share best practices for minimizing risk. Drawing from his extensive experience in incident response at Microsoft, Shiva takes us through the cyber kill-chain, from initial access to ransomware extortion, providing essential tips and insights.
Thanks for subscribing!