Attackers want your identity, your employee’s identity, and your client’s identity.
For 25 years, identity has been synonymous with Active Directory (AD) and Microsoft Entra ID (formerly Azure AD).
Active Directory is a marvelous service that was built a quarter of a century ago, before hackers emerged as a threat for enterprises as they are today. Well-resourced bad actors and creative exploits make companies large and small highly vulnerable to threat actors. In fact, Active Directory is involved in 9 out of 10 cyberattacks—either as the target or the route to a target.
Join Semperis (Paul) and CriticalMatrix (Nim) for a review of the top vulnerabilities we encounter in AD and Entra ID, how to mitigate them with free tools, and the complications of recovery.
You will learn:
- How to use free tools to reduce your Entra ID attack surface
- Discover the most common Active Directory / Entra ID vulnerabilities and misconfigurations
- Why AD is the cyber kill chain’s weakest link, exploited in virtually every modern attack
- New cyber-first disaster recovery technologies that automate the recovery of complex systems, facilitate recovery to the cloud, and eliminate the risk of reinfection from system state and bare-metal backups
Nim Nadarajah, Partner at CriticalMatrix | MatrixVentures
With 27+ years shaping the tech landscape, Nim Nadarajah is the Managing Partner at CriticalMatrix. He guides secure scaling for Web 2.0/3.0 companies. Board member at Cyber Security Global Alliance, Headwaters Health Care Centre, and Resonaite, he amplifies cyber security and digital transformation. As recipient of the Top 100 Leaders in Canada 2023 award, he is here to fuel secure growth.
Paul Greeley, Senior Solutions Architect at Semperis
Paul has been working in IT for 23 years and is a Microsoft-certified Solutions Architect that specializes in Zero Trust, hybrid Active Directory security and recovery.