Podcast

The Hybrid Identity Protection (HIP) Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments from cyberattacks. Hosted by 15-year MVP alumnus Sean Deuby, the podcast includes conversations with global identity experts who share their strategic visions and practical guidelines for securing Active Directory and Entra ID, preventing and remediating identity-based attacks, and recovering from identity system attacks.

Start Listening Now

All Podcast Episodes

Explore conversations with global identity security experts about securing hybrid cloud identities, including Active Directory, Entra ID, and Okta.

Exploring the Future of Identity Standards with Pamela Dingle

Exploring the Future of Identity Standards with Pamela Dingle

Pamela Dingle, Microsoft Director of Identity Standards and founding member of Women in Identity, joins Sean for an overview of …

The Origin Story of the HIP Conference | Special HIP 2020 Edition

The Origin Story of the HIP Conference | Special HIP 2020 Edition

Days before the third annual Hybrid Identity Protection conference commences, some of the original figures from the former DEC (Directory …

Becoming Identity-Aware with Identity Defined Security Alliance

Becoming Identity-Aware with Identity Defined Security Alliance

In a recent report from Identity Defined Security Alliance, 79% of enterprises surveyed suffered an identity breach in the past …

Hope Is Not a Strategy: The Security Blueprint for Startups, SMBs, and Beyond

Hope Is Not a Strategy: The Security Blueprint for Startups, SMBs, and Beyond

In this week’s episode, we have Dominic Vogel, the Founder & Chief Strategist at CyberSC, walking through the mistakes and …

The Expert Guide to Azure AD Connect

The Expert Guide to Azure AD Connect

In Episode 9, Jorge de Almeida Pinto talks with Sean about all things Azure AD Connect, your link between Active …

Operating in the Age of Zero Trust and Machine Learning

Operating in the Age of Zero Trust and Machine Learning

The rapid shift in priorities among today’s enterprises is leaving security professionals applying these zero trust— “trust no-one, verify everything”— …