Hi [[ session.user.profile.firstName ]]

Is Remote Access Putting Your Organization at Risk?

Recent events forced us to change the way we work and today most employees are working remotely. While enabling remote access is critical these days, it’s also exposing us to more risk: when hundreds of users are inside the network – who is monitoring and validating that access to our most sensitive assets is legitimate and secure?

In this webinar, we will discuss why remote access is putting organizations at risk. We will review examples of relevant attacks that target our most critical assets, like Active Directory. Finally, we’ll discuss what should be done to mitigate the threat and protect sensitive assets from breach and compromise.
Recorded May 19 2020 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Hed Kovetz, CEO and Co-Founder, Silverfort and Gil Kirkpatrick, Chief Architect, Semperis
Presentation preview: Is Remote Access Putting Your Organization at Risk?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Get the Most Out of Your Active Directory and Google Cloud Oct 28 2020 4:00 pm UTC 60 mins
    Siddharth Bhai, Product Management Lead, Google
    Microsoft Active Directory is still the standard for authentication, authorization, and auditing of users, groups, and applications in Windows environments. In a multi-cloud world, well-configured access policies are more important than ever. How do you leverage the best of what Google Cloud has to offer while working with the realities of your current AD setup?

    Siddharth Bhai is a Product Management Lead at Google Cloud. His current focus is to provide product leadership for managed security services, which streamline customer deployments and enable enterprises to focus on the best public clouds have to offer. He has been active in the Identity & Access Management space for over a decade and enjoys working with many Fortune 1000 & emerging companies. He has spoken about Identity & Access Management at major industry conferences, including Directory Experts Conference, Microsoft TechEd, and Google Cloud Next. He loves connecting with industry professionals, during and outside of conference sessions.

    Eligible for CPE Credits.
  • Navigating a Hybrid World from a Device Management Perspective Oct 28 2020 3:00 pm UTC 60 mins
    Guido Grillenmeier, Chief Technologist, DXC Technology
    Use the cloud, they say. So why don’t we just get rid of our on-prem AD and move everything to the cloud? Especially those computer accounts – should be easy. Ah … your app still needs that drive-letter mounted to your ancient file-service … and simply won’t start after installing the cumbersomely packaged app on a computer that is joined to your Azure-domain? Your user-settings are gone? Sorry … But at least OneDrive is easy to deploy and utilize – basically just enable it for all users … solves all storage problems on its own … until you use it with virtualized clients.  Sound familiar?  In this session, Guido will discuss the challenges most customers face when moving classic on-prem workplace services to the cloud, and how to solve them by properly combining the best of both worlds. 

    Guido Grillenmeier is a Chief Technologist within the Enterprise Services Group at DXC Technology, a company formed in 2017 from the Enterprise Services division of HPE and CSC. Based in Germany, Guido deals primarily with global Windows infrastructure deployments for large enterprise customers and has helped various customers to secure their Active Directory. Guido has often spoken at various technology conferences, including the original NetPro’s Directory Experts Conference (DEC), later called Quest Technical Experts Conference (TEC). He has also been a speaker at various other Microsoft-technology related conferences, such as Microsoft Tech-ED, IT Forum or Windows Connections. In his HP-days, he was part of the Advanced Technology Group and in this role has led the development and delivery for HP's Windows Server 2008 Academies to HP’s own Services division. Guido has been a Microsoft MVP for Directory Services for 11 years. Besides writing articles for technical magazines, Guido is also the co-author of “Microsoft Windows Security Fundamentals” (Digital Press).

    Eligible for CPE Credits.
  • No Silver Bullets: Strengths and Weaknesses of Azure Security Controls Oct 27 2020 5:00 pm UTC 60 mins
    Andy Robbins, Technical Architect, SpecterOps
    Azure makes several security controls available to administrators to help mitigate against prevalent attacks like credential theft, credential re-use, and privilege abuse. Controls like MFA, geo-location restriction, and MS-PIM provide very strong protection against these attacks, but they are not silver bullets. In this talk, we will discuss the strengths and weaknesses of these controls. At the end of the talk, you will understand why you absolutely must use these controls, and also understand the limits of these controls.

    Andy Robbins is a co-creator of BloodHound, a former red teamer and penetration tester, and current Technical Architect at SpecterOps. He has presented at DEF CON, BSides Las Vegas, DerbyCon, ekoparty, and actively researches Active Directory security. He is also a veteran Black Hat trainer.

    Eligible for CPE Credits.
  • Windows Group Policy: Powerful Configuration Tool or Hacker’s Best Friend? Oct 27 2020 4:00 pm UTC 60 mins
    Darren Mar-Elia, VP of Product, Semperis
    What started as a sleepy technology for efficiently configuring 1000s of Windows desktops and servers, has now become a gold mine for attackers looking to expose your security posture and leverage your GPOs as “malware delivery vehicles”.

    In this session, Darren Mar-Elia (the “GPOGUY”) will summarize the nearly 4 years of research he’s done on the various ways attackers are exploiting GP. More importantly, he will break down the key steps you can take to defend your Group Policy environment, and therefore your Windows environment, from abuse.

    During this workshop, we’ll demonstrate:

    -How attackers use Group Policy for reconnaissance
    -How attackers use Group Policy as a vector for malware
    -How you can configure your AD and GPOs to prevent abuse
    -Best practices for managing Group Policy with security in mind

    A 14-year Cloud and Datacenter Microsoft MVP, Darren Mar-Elia has a wealth of experience in Identity and Access Management and was the CTO and founder of SDM software, a provider of Microsoft systems management solutions. Prior to launching SDM, Darren held senior infrastructure architecture roles in Fortune 500 companies and was also the CTO of Quest Software. As a Microsoft MVP, Darren has contributed to numerous publications on Windows networks, Active Directory and Group Policy, and was a Contributing Editor for Windows IT Pro Magazine for 20 years.

    Eligible for CPE Credits.
  • Bypassing Azure AD Conditional Access Oct 27 2020 3:00 pm UTC 60 mins
    Wim van den Heijkant, Co-Founder and Security Consultant, Fortigi
    The recent “hack” at the SANS Institute shows that Azure AD conditional access doesn’t protect you against all form of authentication. This presentation explores all the less known ways to authenticate and access resources protected by Azure AD. I will demonstrate who conditional access was bypassed as well as what you can do to monitor and restrict this kind of access.

    Wim van den Heijkant is Co-Founder and Security Consultant at Fortigi and is passionate about Identity & Security. He has worked with clients in Fortune 500 companies and small start-ups across various industries ranging from financial services to critical infrastructure and government. Wim oversaw projects from design to implementation and aftercare in roles as an engineer, developer, architect, and recently CISCO. He's the founder of several IT companies and loves to coach young and eager IT consultants.

    Eligible for CPE Credits.
  • Malware Mechanics: Understanding What You’re Defending Against Oct 21 2020 6:15 pm UTC 60 mins
    Gil Kirkpatrick, Chief Architect, Semperis
    Today’s malware is stealthy, sophisticated, and can wreak havoc on your network. But most malware relies on a core set of tools and libraries that get the malware in the door, allow it to persist, gather credentials, move laterally through your network, and ultimately steal your data or encrypt your servers. Learn how these tools work, the APIs they use, and the sorts of vulnerabilities they exploit so you can be better armed in your battle against the bad guys.

    Gil Kirkpatrick is the Chief Architect for products at Semperis, a leading provider of cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services on-premises and in the cloud. Gil has been building commercial products for enterprise IT for a very long time, focusing primarily on identity management and security-related products. He has been named a Microsoft MVP for Active Directory and Enterprise Mobility for each of the last 15 years, and is the author of Active Directory Programming, as well as the founder of the Directory Experts Conference. At Semperis Gil builds products to prevent, detect, and recover from cyber-attacks on enterprise hybrid identity environments. Gil speaks on cyber-security, identity, and disaster recovery topics at IT conferences around the world.

    Eligible for CPE Credits.
  • Taking a Large Organization Passwordless Oct 21 2020 5:00 pm UTC 60 mins
    Joe Kaplan, Architecture and Strategy Lead, Accenture
    By now we've all heard about the security and usability benefits of the passwordless authentication future. We've heard about technologies that support passwordless authentication such as Windows Hello for Business, FIDO2, and device sign-in for the Microsoft Authenticator App. How would you go about actually taking your organization passwordless? In this session, we will go on a journey to discover how one large (.5M users) hybrid organization is doing just that. We will cover the technologies at a high level but focus more on the overall approach and the change management journey as we seek to fundamentally change how all of our users access their technology. We also will discuss the challenges around having passwords side-by-side with passwordless options and how we actually plan to eventually take passwords away completely once we really no longer need them.

    Joe Kaplan is the Architecture and Strategy lead for Accenture's Identity and Access Management organization within internal IT. He focuses on solving real-world identity problems for a large, complex business. Joe is the co-author of the "".NET Developer’s Guide to Directory Services Programming"" and is a former Microsoft MVP in Enterprise Mobility + Security.

    Eligible for CPE Credits.
  • Securing Your Legacy Apps with Cloud Identities Oct 21 2020 4:00 pm UTC 60 mins
    Roelf Zomerman, Cloud Solutions Architect, Microsoft
    Join this session to see how you can provide secure access to your legacy applications, streamline, and modernize access to applications that support legacy authentication including Kerberos, Header based, and other protocols for your users and guests in Azure AD. This session will show you how to provide access to (on-premises) applications using Azure AD authentication, supporting FIDO2/WHfB/MFA/etc to provide increased security and a better end-user experience.

    Roelf Zomerman is a Microsoft Cloud Solution Architect, specialized in the architecture of complex solutions in Azure with an eye for hybrid solutions related to identities.

    Eligible for CPE Credits.
  • Account Hygiene: Fixing the Bad for the Good! Oct 21 2020 3:00 pm UTC 60 mins
    Jorge de Almeida Pinto, Lead Identity/Security Consultant, IAM Technologies
    Active Directory (AD) has been around for about two decades, and many organizations started using it as soon as it became available. Large organizations especially use Identity Management systems to manage the lifecycle of identities (user accounts, service accounts, computer accounts, and other account purposes). AD has evolved and with every new release of the OS, it became more secure. However, that does not mean you are automatically using all of the most secure account settings. It also does not mean you automatically stopped using the least secure account settings. What about passwords? Are your users using weak or compromised passwords, and how do you know? Do users own multiple accounts and are they sharing passwords across accounts they own, and how do you know? Weak settings and passwords (i.e. bad account hygiene) are what the bad guys need in order to take over your systems, accounts, and ultimately your AD through e.g. ""lateral movement"". Even with large organizations and with well-managed ADs, you'll be surprised by what you will see when you dig in. Although the best option is to go passwordless, or at least decrease password usage, that may not be a viable option for all organizations. So what can you do about all of this?
    Please join Jorge in this session where he will explain what can be done from a technical and process perspective.

    Jorge de Almeida Pinto is a Lead Identity/Security Consultant working for IAMTEC with a very strong focus on and passion for Microsoft Identity, Security & Access Management technologies, either on-premises or cloud-based. He helps and guides organizations in architecting, designing, implementing, and maintaining secure solutions with a critical, positive, and goal-achieving mindset. He has received the Microsoft MVP Award every year since 2006.

    Eligible for CPE Credits.
  • Six Horror Stories of Hybrid Identity Mismanagement Oct 20 2020 5:00 pm UTC 60 mins
    Sander Berkouwer, Chief Technology Officer, SCCT
    The Microsoft documentation provides clear-cut decisive guidance for integrating Active Directory with Azure AD. This way, Hybrid Identity should emerge. Alas, at some organizations it didn't. Join this session to gain insights into the critical success factors that drive Hybrid Identity and the things that often get overlooked. Sander Berkouwer shares his views on these situations. Of course, this session covers how to avoid these situations yourself, so we all benefit. A true storyteller’s session on real-world events from a speaker with a twisted sense of humor. Be sure to check in!

    The Hybrid Identity implementations that Sander and his team have deployed for multiple organizations, including government ones, provide him with horror stories that are becoming ready to share, now that the hurting has stopped. How we found out that one of the Web Application Proxies was no longer active and why it never got patched after implementation. How we underestimated the impact of GDPR. How we ran 300% over budget for our project because we didn’t account for the Domain Controller upgrades and UPN Suffix renames at a customer. How we found out that ‘All Users’ in Azure AD also includes guest users. How we got a $4000/day bill, when an engineer accidentally enabled all user accounts in MFA Server, triggering an Azure MFA license for everyone in the organization. How our customer treated our Hybrid Identity implementation after we were asked to decommission the environment when the customer went bankrupt.

    Sander Berkouwer calls himself an Active Directory aficionado and has seen thousands of Active Directory and Azure Active Directory implementations in his career. Sander is a Dutch MCSE, MCITP, and MCT and has been a Microsoft Most Valuable Professional (MVP) on Directory Services and Enterprise Mobility for the last eleven years. He is also a Veeam Vanguard and VMware vExpert and writes a blogs on DirTeam.com and ServerCore.net.

    Eligible for CPE Credits.
  • How Tough Are You? Protecting Active Directory at All Costs Oct 20 2020 4:00 pm UTC 60 mins
    Christoffer Andersson, Principal Advisor, Enfo
    This session is based on a real-world, high-security scenario where security was highly prioritized. Christoffer will describe how he implemented a tier-based model in conjunction with physical security zones to protect core infrastructures such as Active Directory and PKI. He implemented technologies and concepts such as PAWs (Privileged Access Workstations), Smart Cards, Authentication Policies & Silos, IPSec, 802.1x. Demos will show the pitfalls of how easily an Enterprise PKI can become the weakest point when it comes to forest dominance. This session brings the reality of building up infrastructure and at the same time consolidate two nuclear power plants, hence the high level of security demand on the solution.

    Christoffer Anderson is a Principal Advisor at Enfo. Directory Services expert and former Microsoft MVP, Christoffer has developed and released several tools to manage various features in Microsoft Windows and Active Directory, such as Fine Grain Policy Tool and ESEDump. He acts on the field as a consultant and a trainer where he is involved in large and complex Active Directory and Identity Management Projects, that involves Design, Deployments, Delivering Heath Checks and Reviews.

    Eligible for CPE Credits.
  • The Untold Truth about Negotiating with Cyber Criminals Oct 20 2020 3:00 pm UTC 60 mins
    Moty Cristal, CEO, NEST, Negotiation Strategies
    When hit with ransomware or when your data has been taken hostage, you will face the need to negotiate with cyber criminals. Many IT and Security professionals believe that the key question is whether to pay or not to pay, however experience shows that regardless of the business decision to pay or not, communicating with cyber criminals, having a better understanding of the scope of the crisis, in-depth profiling of the threat actor and providing creative support to the mitigation efforts – all can significantly improve the overall management of any cyber crisis. In this talk, Moty Cristal, a professional crisis negotiator, will present the logic and the process steps of communicating and negotiating with cyber criminals as well as providing educational insights from recent events.

    Moty Cristal is the CEO of NEST, Negotiation Strategies. He has served in various official capacities in Israeli negotiation teams with Jordan and the Palestinians, and experienced years of intense negotiations. Since 2001, Mr. Cristal advises, consults and trains business people, entrepreneurs, CEOs and senior government officials in Europe, Russia, US and Asia in analyzing, planning and designing complex negotiation processes. He has been working intensively in the energy, construction, financial, technological, pharmaceutical, industrial, transportation and aeronautical sectors, varying from deal-making negotiations, including start-ups investment and marketing processes, cross-cultural business disputes, union-management conflicts, post-merger integration, to business and national crisis management.

    Eligible for CPE Credits.
  • Introductory Video- HipConf Semperis Recorded: Sep 14 2020 2 mins
    Mickey Bresman, CEO, Semperis
    Join HipConf and Semperis for the Hybrid Identity Protection Virtual Conference!
  • Identity-Centric Healthcare Security: Defending the First Responders Recorded: Sep 10 2020 62 mins
    Gil Kirkpatrick and Luke Kane
    While COVID-19 is disrupting many aspects of daily life, it's not slowing down the proliferation of cyberattacks targeting healthcare organizations, both large and small. This webinar will cover the cybersecurity challenges unique to the healthcare industry and how COVID-19 has raised the stakes. We'll also share real-world stories from authorities in the field and provide strategies that you can implement to be resilient during these turbulent times.

    Most of us are familiar with Zero Trust Architecture, but how do we implement this strategy seamlessly within platforms that contain highly sensitive data such as electronic medical records (EMR) and other protected health information (PHI)? It begins with acknowledging "identity as the perimeter" and establishing an identity-centric security strategy. The NIST Cybersecurity Framework is an excellent structure for building this strategy.

    Core topics include:
    - Why medical devices are a highly targeted attack vector
    - How to work with multiple identity systems in your environment
    - What role do Mergers & Acquisitions (M&A) play in this space
    - Where does compliancy fall in the spectrum (PHI, HIPAA, PCI-DSS, etc.)
    - NIST Cybersecurity Framework
  • Podcast | Hope Is Not a Strategy: The Security Blueprint for SMBs and Beyond Recorded: Sep 10 2020 18 mins
    Dominic Vogel
    In this week's episode, we have Dominic Vogel, the Founder & Chief Strategist at CyberSC, walking through the mistakes and cybersecurity misconceptions of small to mid-size businesses. The prevalence of attacks today means SMBs are more vulnerable to become targets or caught in the crossfire. Dominic and Sean cover everything from the most common security mistakes made at the small to mid-size business level to how your security posture can be an advantage in securing new business. One thing remains certain: hope is not a strategy.
  • Podcast | The Expert Guide to Azure AD Connect Recorded: Sep 3 2020 19 mins
    Jorge de Almeida Pinto | Lead Engineer at IAM Technologies
    In Episode 9, Jorge de Almeida Pinto talks with Sean about all things Azure AD Connect, your link between Active Directory and Azure AD.

    Azure AD Connect is Microsoft's identity synchronization mechanism between on-premises Active Directory and in-the-cloud Azure Active Directory. This makes it a critical piece of your hybrid infrastructure. Join us to learn about its features, how to upgrade it, and the very real consequences of not keeping AD Connect up to date.

    Episode Highlights:
  • Podcast | Operating in the Age of Zero Trust and Machine Learning Recorded: Aug 20 2020 25 mins
    Hed Kovetz
    The rapid shift in priorities among today’s enterprises is leaving security professionals applying these zero trust— “trust no-one, verify everything”— principles to existing on-premises networks. In this episode, Sean’s talking with Hed Kovetz, Silverfort CEO and Co-Founder. They discuss not only what “zero trust network” means, but the risk in a perimeterless era of allowing users on untrusted devices to access broad internal network access.
  • Podcast | Choosing the Right Security Solution, Not the Temporary One Recorded: Aug 14 2020 16 mins
    Sander Berkouwer
    Nothing is as permanent in IT as a temporary solution. Sander Berkouwer, 11-time Microsoft MVP and CTO of SCCT, joins Sean on the Hybrid Identity Protection Podcast to discuss the "new normal," dynamics of Azure AD B2B, and what cutting corners in the world of identity access can bring about for administrators.

    Visit https://hipconf.libsyn.com/ to listen to all episodes of HIP: The Podcast.
  • Podcast | Weaning Yourself Away From GUI-Based AD Administration Recorded: Jul 17 2020 16 mins
    Mike Kanakos
    Continuous learning when it comes to being an AD Admin is a requirement as they’re tasked with adapting to maintain relevancy. Mike Kanakos (Senior Systems Engineer in IAM at Align Systems), discusses his path to automating tasks and tips for becoming less dependent on the GUI for Active Directory management, including the 5 Core AD Management PowerShell Cmdlets.
Identity-Driven Cyber Resilience
Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis is headquartered in New York City and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.

Semperis hosts the award-winning Hybrid Identity Protection conference. The company has received the highest level of industry accolades; most recently being named Best Business Continuity / Disaster Recovery Solution by SC Magazine’s 2020 Trust Awards. Semperis is accredited by Microsoft and recognized by Gartner.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Is Remote Access Putting Your Organization at Risk?
  • Live at: May 19 2020 3:00 pm
  • Presented by: Hed Kovetz, CEO and Co-Founder, Silverfort and Gil Kirkpatrick, Chief Architect, Semperis
  • From:
Your email has been sent.
or close