Podcast

Welcome to the Hybrid Identity Protection Podcast. If your job is defending hybrid identity environments from cyberattacks, this is the podcast to put on repeat.

Join our host, 15-year MVP alum Sean Deuby, for thoughtful conversations with global identity experts who share their strategic visions and practical guidelines for securing Active Directory and Entra ID, preventing and remediating identity-based attacks, and recovering from identity system attacks.

Start Listening Now

All Podcast Episodes

Explore conversations with global identity security experts about securing hybrid cloud identities, including Active Directory, Entra ID, and Okta.

Prescriptive Identity Security for Healthcare Organizations with Marty Momdjian

Prescriptive Identity Security for Healthcare Organizations with Marty Momdjian

The life-or-death demands of the healthcare industry complicate identity security. The COVID-19 pandemic, increasing popularity of remote care and Internet …

So, You’ve Been Breached, What Now? Best Practices for Post-Breach Recovery with Yishai Gerstle

So, You’ve Been Breached, What Now? Best Practices for Post-Breach Recovery with Yishai Gerstle

In today’s world, attacks are inevitable, and breaches are probable. The temptation to return to normal operations as quickly as …

Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More with Brian Desmond

Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More with Brian Desmond

What should you tackle first in locking down Active Directory from cyberattacks? In this webinar excerpt, Sean Deuby (Semperis Director …

From EDR to XDR to Identity with Paul Lanzi

From EDR to XDR to Identity with Paul Lanzi

Endpoint detection and response (EDR) is quickly evolving into extended detection and response (XDR). That means that identity is moving …

Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano

Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano

Protection from ransomware often starts with preventing unapproved applications from running on systems. However, the ability to restrict which applications …

Defining the Decision-Making Process for Cyberattack Incident Response with Benjamin Cauwel

Defining the Decision-Making Process for Cyberattack Incident Response with Benjamin Cauwel

When cybercriminals take down your organization, you might have your technical response plan locked and loaded. But who’s calling the …