Cyberattacks on Education: How to Strengthen Identity Security

Cyberattacks on Education: How to Strengthen Identity Security

  • Semperis
  • Sep 28, 2023

Cyberattacks on education are on the rise. What are attackers after, and why are they increasingly targeting K-12 and higher education? And what can you do to protect your organization? In this webinar, Semperis Solutions Architect Alexandra Weaver will give you expert insight into lessons learned from recent education-focused cyberattacks…

5 Identity Vulnerabilities every CISO must know

5 Identity Vulnerabilities every CISO must know

  • Semperis
  • Sep 20, 2023

Attackers want your identity, your employee’s identity, and your client’s identity. For twenty-five years identity has been synonymous with Active Directory, Azure AD / Microsoft Entra. Active Directory is a marvelous service that was built a quarter of a century ago before hackers emerged as a threat for enterprises as…

Identity Security for the Public Sector: Protecting Active Directory

Identity Security for the Public Sector: Protecting Active Directory

  • Semperis
  • Sep 18, 2023

Ransomware and other cyber threats targeting the public sector are on the rise. Today’s attackers often have a common focus: infiltrating your identity systems, typically Active Directory (AD) or Azure AD (now Entra ID) for most organizations. An identity breach can lead to data theft, malware insertion, and ransomware attacks…

Can Your Organization Pass an Identity Security Assessment?

Can Your Organization Pass an Identity Security Assessment?

  • Semperis
  • Sep 18, 2023

Cyberattackers love to exploit gaps in Active Directory (AD) security. When did you last evaluate your hybrid AD security posture? In this webinar, Semperis Senior Solutions Architect Mike Carlson will draw from his years of hands-on experience and use Semperis free community tools to illustrate how to determine whether your…

What does a successful Identity Threat Detection and Response (ITDR) strategy look like?

What does a successful Identity Threat Detection and Response (ITDR) strategy look like?

  • Semperis
  • Jul 25, 2023

What is Endpoint Detection & Response (EDR) and why ITDR goes beyond zero trust and edge protection. Join our fireside chat with David Hitchen on how to protect and remediate your identity when the attacker is a legitimate user. Speaker Bio: David Hitchen is a Senior Solutions Architect and veteran…

Why Active Directory Security is Critical to Cybersecurity

Why Active Directory Security is Critical to Cybersecurity

  • Semperis
  • Jul 25, 2023

Active Directory (AD) is the core identity infrastructure for most organizations, acting as the primary source of trust for identity and access. But AD is also often a weak link that is exploited in nearly every modern cyberattack. If an organization's AD is encrypted or wiped out, business comes to…

Governance, Risk, and Compliance—and ITDR

Governance, Risk, and Compliance—and ITDR

  • Semperis
  • Jul 24, 2023

In enterprises, business risks and IT risks are tightly coupled. Identity platforms like Active Directory and Azure AD are at the core of enterprise access control and management. Preventing threat actors from bypassing the security and auditing controls of your identity platforms is vital to meeting governance, risk, and compliance…

Securing Your Identity Infrastructure from Insider Threats

Securing Your Identity Infrastructure from Insider Threats

  • Semperis
  • Jun 29, 2023

Cybersecurity strategies tend to focus on external threats. But insider threats are on the rise, increasing by 44% over the past two years. Whether caused by employee negligence or malicious intent, insider-related incidents incur an average cost of $484,931 per event, posing a serious risk to your business. Can your…

Would your Organization Fail an Identity Assessment?

Would your Organization Fail an Identity Assessment?

  • May 30, 2023

In this interactive webinar, Kriss will take participants on a journey to explore whether or not their organizations would pass or fail an identity assessment. Drawing from his years of hands-on experience and using Semperis community tools, Kriss will provide valuable insights into common pitfalls, best practices, and real-world examples…

How Semperis Maps to MITRE ATT&CK, Essential8 (AU) & CCoP (SG) Frameworks

How Semperis Maps to MITRE ATT&CK, Essential8 (AU) & CCoP (SG) Frameworks

  • May 26, 2023

Security frameworks have been developed by government and security organisations to help companies and governments alike develop a baseline of minimum cybersecurity practices. In this webinar we will explore the Mitre Att&ck framework, as well as Essential8 from Australia and CCoP from Singapore to understand how Semperis technologies map to…