What should you tackle first in locking down Active Directory from cyberattacks? In this webinar excerpt, Sean Deuby (Semperis Director of Services) and Brian Desmond (Principal of Ravenswood Technology Group) share tips for five actions you can take now to significantly improve your security posture: 1) implement good identity processes, 2) ensure that trust settings are reviewed to close security gaps, especially in environments with mergers and acquisitions, 3) plan and test your AD backup and recovery strategy, 4) check your Kerberos settings, and 5) deter lateral movement by cyberattackers.
This episode features Dr. Chase Cunningham, Chief Strategy Officer at Demo-Force.com. Widely known as “Dr. Zero Trust”, he’s the creator …
This episode features Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity. A founding member of Cohesity’s Security Center of …
This episode features Chris Inglis, former U.S. National Cyber Director and longtime Deputy Director of the NSA. With over 40 years …
This episode features Jake Hildreth, Principal Security Consultant at Semperis. With nearly 25 years of IT experience, Jake has seen how …
This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer. With decades of experience securing complex …
Sean is joined by identity expert Sander Berkouwer to explore the evolving landscape of enterprise authentication. Active Directory Federation Services …
The 2017 NotPetya cyberattack remains one of the most devastating and costly breaches in history, inflicting over $1.4 billion in …
In this time of constant cyberattacks and increased cybersecurity reporting requirements, a CISO's job is no easy task and typically …
How is IAM—and the role of the identity security professional—adapting to meet the challenges of today's threat landscape? In this …
Microsoft describes its Detection and Response Team (DART) as the "cybersecurity team we hope you never meet." In this episode of the HIP Podcast, Sean speaks with Shiva P, a Senior Consultant with Microsoft DART. Together, they delve into the tactics used by threat actors and share best practices for minimizing risk. Drawing from his extensive experience in incident response at Microsoft, Shiva takes us through the cyber kill-chain, from initial access to ransomware extortion, providing essential tips and insights.
Thanks for subscribing!