2024: Sessions on demand March 2025!

Podcast

The Hybrid Identity Protection (HIP) Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments from cyberattacks. Hosted by 15-year MVP alumnus Sean Deuby, the podcast includes conversations with global identity experts who share their strategic visions and practical guidelines for securing Active Directory and Entra ID, preventing and remediating identity-based attacks, and recovering from identity system attacks.

All Podcast Episodes

Explore conversations with global identity security experts about securing hybrid cloud identities, including Active Directory, Entra ID, and Okta

Is Cloud Security an Oxymoron?

Is Cloud Security an Oxymoron?

Is cloud security an oxymoron? In this panel session, originally recorded at the inaugural HIP Europe event, Sean Deuby talks …

Securing Digital Identities with Julie Smith

Securing Digital Identities with Julie Smith

How successful are recent efforts to elevate identity security among enterprises across the United States? IDS Alliance surveyed 500+ security …

Scaling Identity for the Future with Denis Ontiveros Merlo

Scaling Identity for the Future with Denis Ontiveros Merlo

Security architectures depend on identity—the “new security boundary.” Yet despite investment in identity and attempts to drive a sustainable identity …

What You Should Know About Azure AD Security with Dr. Nestori Syynimaa

What You Should Know About Azure AD Security with Dr. Nestori Syynimaa

The AADInternals toolkit is a powerful resource for administering and hacking Azure AD. In this episode of the HIP Podcast, …

Achieving Operational Resilience with Simon Hodgkinson

Achieving Operational Resilience with Simon Hodgkinson

Hopefully, your organization has a disaster recovery plan. But do you have a plan for operational resilience? In this HIP …

Solving the Application Security Challenge with Daniel Stefaniak

Solving the Application Security Challenge with Daniel Stefaniak

What does flossing your teeth and combatting application security vulnerabilities have in common? We find out in this session of …