Hi [[ session.user.profile.firstName ]]

Panel: Future Proofing Identity Security

Sean Deuby, host of HIP podcast, sits down with industry experts and a special guest, Julie Smith.

Julie Smith is the Executive Director of the IDSA, responsible for executing the mission on behalf of the membership and the identity and security community. Throughout her career she has held various leadership roles in technology and solutions companies, including product management, product and solutions marketing and business development. Prior to joining the IDSA, Julie spent 12 years in the identity and security industry with leading vendors and solution providers.

Siddharth Bhai is a Product Management Lead at Google Cloud. His current focus is to provide product leadership for managed security services, which streamline customer deployments and enable enterprises to focus on the best public clouds have to offer. He has been active in the Identity & Access Management space for over a decade and enjoys working with many Fortune 1000 & emerging companies. He has spoken about Identity & Access Management at major industry conferences, including Directory Experts Conference, Microsoft TechEd, and Google Cloud Next.

Gil Kirkpatrick is the Chief Architect at Semperis. Gil has been building commercial products for enterprise IT for a very long time, focusing primarily on identity management and security-related products. He has been named a Microsoft MVP for Active Directory and Enterprise Mobility for each of the last 15 years, and is the author of Active Directory Programming, as well as the founder of the Directory Experts Conference.

Host: Sean Deuby, 15-time Microsoft MVP and HIP Podcast Host. Sean brings 30 years’ experience in Enterprise IT and Hybrid Identity to his role as Director of Services at Semperis. An original architect and technical leader of Intel's Active Directory, Texas Instrument’s Windows NT network, and 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception.
Live online Oct 28 7:15 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Julie Smith, Executive Director of Identity Defined Security Alliance (IDSA)
Presentation preview: Panel: Future Proofing Identity Security

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • SANDWORM: Lessons from the Ukrainian Cyberwar and Beyond Oct 20 2020 2:00 pm UTC 60 mins
    Andy Greenberg, Cybersecurity Journalist, WIRED
    Andy Greenberg is a senior writer for WIRED, covering security, privacy, information freedom and hacker culture. He's the author of the book "Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers." Greenberg previously worked as a senior reporter for Forbes magazine.
  • Podcast | Becoming Identity-Aware with Identity Defined Security Alliance Recorded: Sep 24 2020 23 mins
    Julie Smith | Executive Director, Identity Defined Security Alliance (IDSA)
    In a recent report from Identity Defined Security Alliance, 79% of enterprises surveyed suffered an identity breach in the past two years. For episode 11, Executive Director for the IDSA, Julie Smith, joins us with special guest, Gil Kirkpatrick (16-time Microsoft MVP and Chief Architect at Semperis). They discuss zero-trust model initiatives, the NIST Framework, and the call for organizations to have an identity-centric strategy.



    Want to learn more about IDSA?
    Identity Defined Security Alliance provides vendor-neutral, free education, and resources that help organizations reduce the risk of a breach through identity-centric security strategies. To learn more, visit: https://www.idsalliance.org/
  • Seizing the Castle: A Medieval Battle Technique Workshop Recorded: Sep 16 2020 66 mins
    Chris Roberts and Darren Mar-Elia
    As InfoSec professionals, understanding the adversarial techniques used by the Vikings, Mongols, Huns, and so on, just might make us even better at our jobs.

    Join Semperis Hacker in Residence, Chris Roberts, and Semperis VP of Products Darren Mar-Elia for an unconventional workshop where they'll chat about new and emerging cyberattacks without actually talking about "cyber" at all.
  • Introductory Video- HipConf Semperis Recorded: Sep 14 2020 2 mins
    Mickey Bresman, CEO, Semperis
    “We started the Hybrid Identity Protection conference back in 2016 with the mission to facilitate expert collaboration and knowledge sharing in the identity world. Today, HIP is a thriving community of practitioners charged with defending cross-cloud and hybrid environments. This year, the HIP conference is fully digital and free, with technical workshops spread across four days. You’ll hear from cybersecurity authorities and peers working every day to solve complex identity challenges that arise in today’s fast-moving business environment. I invite participants to not only listen but also take part in the conversation.” - Mickey Bresman | Semperis CEO
  • Identity-Centric Healthcare Security: Defending the First Responders Recorded: Sep 10 2020 62 mins
    Gil Kirkpatrick and Luke Kane
    While COVID-19 is disrupting many aspects of daily life, it's not slowing down the proliferation of cyberattacks targeting healthcare organizations, both large and small. This webinar will cover the cybersecurity challenges unique to the healthcare industry and how COVID-19 has raised the stakes. We'll also share real-world stories from authorities in the field and provide strategies that you can implement to be resilient during these turbulent times.

    Most of us are familiar with Zero Trust Architecture, but how do we implement this strategy seamlessly within platforms that contain highly sensitive data such as electronic medical records (EMR) and other protected health information (PHI)? It begins with acknowledging "identity as the perimeter" and establishing an identity-centric security strategy. The NIST Cybersecurity Framework is an excellent structure for building this strategy.

    Core topics include:
    - Why medical devices are a highly targeted attack vector
    - How to work with multiple identity systems in your environment
    - What role do Mergers & Acquisitions (M&A) play in this space
    - Where does compliancy fall in the spectrum (PHI, HIPAA, PCI-DSS, etc.)
    - NIST Cybersecurity Framework
  • Podcast | Hope Is Not a Strategy: The Security Blueprint for SMBs and Beyond Recorded: Sep 10 2020 18 mins
    Dominic Vogel
    In this week's episode, we have Dominic Vogel, the Founder & Chief Strategist at CyberSC, walking through the mistakes and cybersecurity misconceptions of small to mid-size businesses. The prevalence of attacks today means SMBs are more vulnerable to become targets or caught in the crossfire. Dominic and Sean cover everything from the most common security mistakes made at the small to mid-size business level to how your security posture can be an advantage in securing new business. One thing remains certain: hope is not a strategy.
  • Podcast | The Expert Guide to Azure AD Connect Recorded: Sep 3 2020 19 mins
    Jorge de Almeida Pinto | Lead Engineer at IAM Technologies
    In Episode 9, Jorge de Almeida Pinto talks with Sean about all things Azure AD Connect, your link between Active Directory and Azure AD.

    Azure AD Connect is Microsoft's identity synchronization mechanism between on-premises Active Directory and in-the-cloud Azure Active Directory. This makes it a critical piece of your hybrid infrastructure. Join us to learn about its features, how to upgrade it, and the very real consequences of not keeping AD Connect up to date.

    Episode Highlights:
  • Podcast | Operating in the Age of Zero Trust and Machine Learning Recorded: Aug 20 2020 25 mins
    Hed Kovetz
    The rapid shift in priorities among today’s enterprises is leaving security professionals applying these zero trust— “trust no-one, verify everything”— principles to existing on-premises networks. In this episode, Sean’s talking with Hed Kovetz, Silverfort CEO and Co-Founder. They discuss not only what “zero trust network” means, but the risk in a perimeterless era of allowing users on untrusted devices to access broad internal network access.
  • Podcast | Choosing the Right Security Solution, Not the Temporary One Recorded: Aug 14 2020 16 mins
    Sander Berkouwer
    Nothing is as permanent in IT as a temporary solution. Sander Berkouwer, 11-time Microsoft MVP and CTO of SCCT, joins Sean on the Hybrid Identity Protection Podcast to discuss the "new normal," dynamics of Azure AD B2B, and what cutting corners in the world of identity access can bring about for administrators.

    Visit https://hipconf.libsyn.com/ to listen to all episodes of HIP: The Podcast.
  • Podcast | Weaning Yourself Away From GUI-Based AD Administration Recorded: Jul 17 2020 16 mins
    Mike Kanakos
    Continuous learning when it comes to being an AD Admin is a requirement as they’re tasked with adapting to maintain relevancy. Mike Kanakos (Senior Systems Engineer in IAM at Align Systems), discusses his path to automating tasks and tips for becoming less dependent on the GUI for Active Directory management, including the 5 Core AD Management PowerShell Cmdlets.
  • Windows Group Policy: Powerful Configuration Tool or Hacker’s Best Friend? Recorded: Jul 16 2020 61 mins
    Darren Mar-Elia
    What started as a sleepy technology for efficiently configuring 1000s of Windows desktops and servers, has now become a gold mine for attackers looking to expose your security posture and leverage your GPOs as “malware delivery vehicles”.

    In this webinar, Darren Mar-Elia (the “GPOGUY”) will summarize the nearly 4 years of research he’s done on the various ways attackers are exploiting GP. More importantly, he will break down the key steps you can take to defend your Group Policy environment, and therefore your Windows environment, from abuse.

    During this workshop, we’ll demonstrate:

    - How attackers use Group Policy for reconnaissance
    - How attackers use Group Policy as a vector for malware
    - How you can configure your AD and GPOs to prevent abuse
    - Best practices for managing Group Policy with security in mind
  • Podcast | Coping With User Demand Recorded: Jun 30 2020 20 mins
    Mary Jo Foley
    When the forecasting and planning for 2020 couldn’t call for what was in store, Microsoft became tasked with quickly catch up to the demand necessary for the new reality users faced. Expert Microsoft strategist and “Windows Weekly” podcast host, Mary Jo Foley, joins Sean to discuss just how Microsoft had to come to grips with the increased infrastructure load courtesy of COVID.
  • Podcast: Managing and Securing Cloud-Only Accounts in Your Hybrid Environment Recorded: Jun 10 2020 20 mins
    Allen Brokken
    Today’s guest on The HIP Podcast is Microsoft Cloud Specialist, Allen Brokken. As an expert in leveraging hybrid cloud techniques, Allen shares the right way to deal with admin accounts in your cloud service and how a phone call to the security operations center may be the best way to secure your global administrator accounts.
  • The Dos and Don’ts of Recovering Active Directory from a Scorched Earth Disaster Recorded: May 27 2020 62 mins
    Gil Kirkpatrick and Guido Grillenmeier
    The threat to Active Directory from ransomware and wiper attacks is generally understood, but the complexity of forest recovery is not. In “the good old days," AD recovery meant recovering AD from natural disasters and operational errors. But cyberattacks changed all that. With AD becoming a prime target for widespread, business-crippling attacks, it’s time to think “cyber-first."

    In this technical workshop, you’ll learn the dos and don’ts of recovering AD from a cyber disaster.

    The Presenters:
    - Guido Grillenmeier, Microsoft MVP & Chief Technologist, DXC Technology

    - Gil Kirkpatrick, Microsoft MVP & Chief Architect, Semperis
  • Podcast: Keeping a Security-First Mindset in a "Get It Done Fast" World Recorded: May 22 2020 17 mins
    Sean Metcalf
    In times of rapid change, security tends to take a back seat. And good hackers never waste a crisis. So, how are the pros managing remote access security risks during COVID-19? Tune into HIP Podcast episode # 3 featuring leading white hat Active Directory security expert, Sean Metcalf.

    Check out all Hybrid Identity Protection Podcast episodes at, https://hipconf.libsyn.com/
  • Is Remote Access Putting Your Organization at Risk? Recorded: May 19 2020 61 mins
    Hed Kovetz, CEO and Co-Founder, Silverfort and Gil Kirkpatrick, Chief Architect, Semperis
    Recent events forced us to change the way we work and today most employees are working remotely. While enabling remote access is critical these days, it’s also exposing us to more risk: when hundreds of users are inside the network – who is monitoring and validating that access to our most sensitive assets is legitimate and secure?

    In this webinar, we will discuss why remote access is putting organizations at risk. We will review examples of relevant attacks that target our most critical assets, like Active Directory. Finally, we’ll discuss what should be done to mitigate the threat and protect sensitive assets from breach and compromise.
  • Podcast: Cover Your SAAS: Getting a Handle on Access and Activity in a Cloud-F Recorded: May 6 2020 21 mins
    Ben Johnson
    With remote workforces accelerating digital transformation, security teams are shifting their mindset from controlling assets to managing access. This is not easy, especially in a cloud-first world where ease of installation and free trials reign supreme. In episode # 2 of the HIP Podcast, Ben Johnson, CTO and co-founder of Obsidian Security, discusses the new access-related issues that organizations face during COVID-19 and beyond.

    Check out all Hybrid Identity Protection Podcast episodes at, https://hipconf.libsyn.com/
  • Ransomware vs. Active Directory Backups Webinar Recorded: Apr 28 2020 61 mins
    Sean Deuby and Clark Brown
    What Can Throw a Wrench Into Your Disaster Recovery Process?
    When a ransomware or wiper attack takes out the domain controllers, traditional recovery processes can drag on for days or even weeks. Considering that cyber disasters now strike more frequently and inflict more business damage than natural disasters, it’s time to think “cyber-first.”

    Cyber-first requirements for Active Directory recovery:
    • Fully automate AD forest recovery
    • Prevent malware re-infection from BMR and system state backups
    • Restore AD to any hardware (virtual or physical)
    • Regain control of a compromised AD
    • Ensure the integrity of highly sensitive AD forests

    Presented by Sean Deuby (Director of Services at Semperis) and Clark Brown (Partner and Practice Leader at Alescent)
  • Podcast: Provisioning Identities with Security First Frame of Mind in Recorded: Apr 16 2020 15 mins
    Andrew Cedergren
    In this premiere episode of the HIP Podcast, host Sean Deuby is joined by IAM, Senior Security Engineer Lead at Delta Airlines, Andrew Cedergren. Having worked across directory services and information security for over 15 years, Andrew offers his expert perspective on the day-to-day fundamentals of building, operating and securing the hybrid enterprise.

    Check out all Hybrid Identity Protection Podcast episodes at, https://hipconf.libsyn.com/
  • Attacking and Defending AD Workshop Recorded: Apr 2 2020 71 mins
    Darren Mar-Elia and Andy Robbins
    How do you defend Active Directory, aka the “keys to the kingdom,” if you don’t know where the attacks are coming from? Hackers constantly find new ways to break into AD. And once inside, they’re increasingly adept at covering their tracks to silently create backdoors and establish persistent privileged access.

    In this workshop, we’ll demonstrate real-world attacks that are frequently used against AD, including credential theft, Kerberos-based attacks, Group Policy-based attacks, and ACL attacks.

    The expert presenters will play out both perspectives: attacker and defender. This is a red vs. blue standoff, so don’t expect a bunch of slideware.
Identity-Driven Cyber Resilience
Semperis is the pioneer of identity-driven cyber resilience for cross-cloud and hybrid environments. The company provides cyber preparedness, incident response, and disaster recovery solutions for enterprise directory services—the keys to the kingdom. Semperis’ patented technology for Microsoft Active Directory protects over 40 million identities from cyberattacks, data breaches, and operational errors. Semperis is headquartered in New York City and operates internationally, with its research and development team distributed between San Francisco and Tel Aviv.

Semperis hosts the award-winning Hybrid Identity Protection conference. The company has received the highest level of industry accolades; most recently being named Best Business Continuity / Disaster Recovery Solution by SC Magazine’s 2020 Trust Awards. Semperis is accredited by Microsoft and recognized by Gartner.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Panel: Future Proofing Identity Security
  • Live at: Oct 28 2020 7:15 pm
  • Presented by: Julie Smith, Executive Director of Identity Defined Security Alliance (IDSA)
  • From:
Your email has been sent.
or close