Podcast
The Hybrid Identity Protection (HIP) Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments from cyberattacks. Hosted by 15-year MVP alumnus Sean Deuby, the podcast includes conversations with global identity experts who share their strategic visions and practical guidelines for securing Active Directory and Entra ID, preventing and remediating identity-based attacks, and recovering from identity system attacks.
Recovering Entra ID Resources and Data with Tuna Gezer
Sean talks with Tuna Gezer, Senior Product Manager for Semperis Disaster Recovery for Entra Tenant (DRET), about how Entra ID…
All Podcast Episodes
Explore conversations with global identity security experts about securing hybrid cloud identities, including Active Directory, Entra ID, and Okta
Supporting the Identity Pro Community with Daniel Stefaniak
Application security got you down? In this session of the HIP Podcast, Sean Deuby talks with Daniel Stefaniak, Sr Product …
Prescriptive Identity Security for Healthcare Organizations with Marty Momdjian
The life-or-death demands of the healthcare industry complicate identity security. The COVID-19 pandemic, increasing popularity of remote care and Internet …
So, You’ve Been Breached, What Now? Best Practices for Post-Breach Recovery with Yishai Gerstle
In today’s world, attacks are inevitable, and breaches are probable. The temptation to return to normal operations as quickly as …
Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More with Brian Desmond
What should you tackle first in locking down Active Directory from cyberattacks? In this webinar excerpt, Sean Deuby (Semperis Director …
From EDR to XDR to Identity with Paul Lanzi
Endpoint detection and response (EDR) is quickly evolving into extended detection and response (XDR). That means that identity is moving …
Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano
Protection from ransomware often starts with preventing unapproved applications from running on systems. However, the ability to restrict which applications …