Who really has access to your applications and critical infrastructure? You’ve probably heard that identity is the new security perimeter. But how far does that perimeter extend? The key is knowing which assets are in Tier 0—the critical control plane that must be secured to protect your organization from cyber threats—and which potential attack paths lead to those assets, including Active Directory (AD). Semperis Senior Director of Security Product Management, Ran Harel, discusses the challenges of AD security and attack path management in hybrid AD environments.
This episode features Heather Costa, Director of Technology Resilience at Mayo Clinic. A leading voice in organizational resilience, Heather has …
This episode features Dr. Chase Cunningham, Chief Strategy Officer at Demo-Force.com. Widely known as “Dr. Zero Trust”, he’s the creator …
This episode features Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity. A founding member of Cohesity’s Security Center of …
This episode features Chris Inglis, former U.S. National Cyber Director and longtime Deputy Director of the NSA. With over 40 years …
This episode features Jake Hildreth, Principal Security Consultant at Semperis. With nearly 25 years of IT experience, Jake has seen how …
This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer. With decades of experience securing complex …
Sean is joined by identity expert Sander Berkouwer to explore the evolving landscape of enterprise authentication. Active Directory Federation Services …
The 2017 NotPetya cyberattack remains one of the most devastating and costly breaches in history, inflicting over $1.4 billion in …
In this time of constant cyberattacks and increased cybersecurity reporting requirements, a CISO's job is no easy task and typically …
How is IAM—and the role of the identity security professional—adapting to meet the challenges of today's threat landscape? In this …
Thanks for subscribing!