Cyber Resilience By Design

Cyber Resilience By Design

  • Semperis
  • Jun 13, 2025

Healthcare is a high-value target for threat actors and adversaries. Yet all too often, incident response plans rely on assumptions that can fall apart during a real crisis. In this focused webinar, you’ll learn why healthcare has a “cyber-crisis management crisis” and how organizations can achieve cyber and operational resilience.…

Beyond Defense: Active Directory Recovery and Business Resilience

Beyond Defense: Active Directory Recovery and Business Resilience

  • Semperis
  • May 19, 2025

Endpoint security, cyber insurance, and generalized disaster recovery plans are all important—but they won’t save your business from a major cyberattack. To keep operations running smoothly despite cyber threats, analysts and cybersecurity leaders recommend a focus on resilience.   In this session, James Ravenell (Senior Solutions Architect, Semperis) explains why the…

Closing the Gap for Government Agencies: 5 Ways to Automate Cyber Resilience

Closing the Gap for Government Agencies: 5 Ways to Automate Cyber Resilience

  • Semperis
  • May 19, 2025

Operational continuity depends on cyber resilience. Maintaining that resilience can be tricky when resources are scarce. Attackers know this and are skilled at turning staffing turnover and technology gaps to their advantage. Attackers’ favorite means of spreading malware, escalating privilege, and establishing perseverance is the identity infrastructure—typically Microsoft Active Directory…

Achieving Resilience: Strengthening Business Through Cyber Incident Preparedness

Achieving Resilience: Strengthening Business Through Cyber Incident Preparedness

  • Semperis
  • Apr 30, 2025

In today’s threat landscape, attackers prioritize identity and access management systems like Microsoft’s Active Directory (AD) because they hold the keys to the kingdom in most enterprises. In other words, compromise AD, and you control the organization. That’s why modern cyber resilience strategies must focus on AD hardening, monitoring, and…

Tabletop to Reality: Building Cyber-Resilience Through Incident Response Drills

Tabletop to Reality: Building Cyber-Resilience Through Incident Response Drills

  • Semperis

In today's threat landscape, the speed and effectiveness of your incident response can mean the difference between a minor setback and a catastrophic breach. The question isn't if a cyberattack will happen, but when—and preparation remains your strongest line of defense. Tabletop exercises aren't just practice—they're essential in exposing vulnerabilities,…

Why Is Your AD an Easy Target for Hackers?

Why Is Your AD an Easy Target for Hackers?

  • Semperis

Active Directory (AD) remains a cornerstone for many organizations, both on premises and integrated with Microsoft Entra ID in the cloud. Alarmingly, 90% of cyberattacks target AD, the central identity system for most enterprises. Semperis provides comprehensive protection for on-premises AD and Entra ID, offering continuous defense against identity-based threats before,…

Overcoming Vulnerabilities with Attack Surface Management

Overcoming Vulnerabilities with Attack Surface Management

  • Semperis

As the digital landscape expands, managing and securing the attack surface of your organization has never been more crucial. Join us for a hot topics webcast where industry experts will provide a comprehensive forecast of attack surface management (ASM) trends and offer strategic guidance for late 2024 and early 2025.…

How to Recover Active Directory When Every Second Counts

How to Recover Active Directory When Every Second Counts

  • Semperis

Microsoft Active Directory (AD) is a key target for cyberattackers. When AD goes down, so do your operations. Yet most organizations lack an AD-specific recovery plan or rely on manual recovery, which can take days if not weeks. Auditing your AD security stance and maintaining a solid incident response plan…

When Every Minute Counts Recovering AD During an Attack

When Every Minute Counts Recovering AD During an Attack

  • Semperis

What do you do when your endpoint or other initial protections are breached? What do you do when intruders are already in your network and have possibly compromised your Active Directory (AD) forest? This is the true story of a ransomware attack—and how it was stopped. Join Semperis' Sean Deuby, 15-time…

Business Continuity and Identity System Recovery

Business Continuity and Identity System Recovery

  • Semperis

Is your disaster recovery plan designed with business continuity in mind? Unless it includes specific procedures for securely recovering Active Directory (AD) and Entra ID, you might be in for a nasty shock. Secure identity system recovery is a key factor in determining how quickly your organization can get back…