Resources
HIP community members believe that education is our strongest defense. Explore past conference sessions, keynotes, panels, and more from the world’s premier identity security experts.
Huzzah! 2025 sessions are now available.
Through the lens of five detailed case studies of real-world identity security incidents from Semperis’ response team, Alex Weinert, Chief Product Officer at Semperis and former VP of Identity Security at Microsoft, outlines a three-part framework for protecting identity fabric: before attacks (posture work), during attacks (detection and response), and after attacks (secure recovery).
Join Senior Solution Architect and former Microsoft PFE Tim Wolf for a practical, step-by-step hybrid recovery approach for both on-prem Active Directory and Entra ID.
Refresh your understanding of hybrid Active Directory security challenges and incident response strategies, with practical tips for minimizing panic during cyber incidents.
Through live demos, Microsoft MVP Christopher Brumm shows how you can implement granular access controls, privileged identity management, and access packages for partners and consultants, while maintaining high security standards.
This discussion—featuring HIP Community experts Jorge De Almeida Pinto, Eric Woodruff, Michael Van Horenbeeck, Christopher Brumm, and Alex Weinert—reminds you that most attacks still use traditional methods, so the basic security hygiene you already practice is crucial.
In this panel discussion, discover how ransomware has profoundly changed disaster recovery and why true cyber resilience requires collaboration between IT operations, identity, and cybersecurity teams, with stress-resistant leadership empowered to make critical decisions quickly.
In this HIP Conf session, Tim Wolf, Senior Solution Architect at Semperis, discusses the challenges of traditional PAW implementations and explores how modern PAW approaches offer greater flexibility and easier management while maintaining Zero Trust principles.
Token theft attacks—which enable attackers to impersonate users even in environments with strong authentication—are on the rise. Fortunately, Entra ID has built-in protections. Discover how to use them, how threat actors also leverage them, and how to detect such abuse.
True: You can’t get rid of NTLM in 30 minutes. The entire process typically takes months or even years. But in 30 minutes, you can learn invaluable tips for removing NTLM quickly but precisely. Get the method and toolkit in this HIP Conf session.
In an era where artificial intelligence is both a weapon and a shield, cybersecurity leaders must rethink their defenses. Microsoft EMEA Chief Security Advisor Simone Pezzoli explores how AI is reshaping the identity threat landscape and how proactive identity orchestration neutralizes the most sophisticated exploits.
Microsoft Security expert and MVP Ru Campbell has worked across hundreds of Microsoft 365 and Entra ID tenants while building a multi-tenant cloud security posture management (CSPM) platform. This session distills practical lessons from that experience. Leave with a focused, immediately actionable set of high-impact security changes that you can apply to your own tenants.
Active Directory expert Christoffer Andersson delivers an in-depth technical presentation and practical security demonstration on the internal workings of Active Directory, clarifying common misconceptions and demonstrating advanced troubleshooting techniques.