How to Get the Best Cyber Insurance by Demonstrating Operational Resiliency

How to Get the Best Cyber Insurance by Demonstrating Operational Resiliency

  • Semperis
  • Oct 21, 2022

Live panel discussion with Ed Amoroso (TAG Cyber), Anthony Dagostino (Converge), and Jim Doggett (Semperis) With the rise of ransomware and cybercrime, having an effective cyber insurance policy in place is part of a layered defense strategy. But the cyber insurance industry is in a state of flux as the…

Resurrecting Active Directory After a Ransomware Attack

Resurrecting Active Directory After a Ransomware Attack

  • Sep 27, 2022

Jorge has been a Microsoft MVP since 2006 with a specific focus on designing, implementing, and securing Microsoft Identity & Access Management (IAM) technologies. Holding various Microsoft certifications, his experience includes Active Directory (AD) design and implementation, training, presenting, developing security-related scripts and tools, and developing and implementing AD and…

Reverse Engineering a Hackers Approach to Breaking into Healthcare

Reverse Engineering a Hackers Approach to Breaking into Healthcare

  • Sep 08, 2022

What do hackers want from healthcare? And how can healthcare CIOs protect vital identity infrastructure from attacks? Guido Grillenmeier, Chief Technologist at Semperis, and Matt Sickles, Solutions Architect at Sirius Healthcare, walk This Week Health through the use of Purple Knight, a free tool for your Identity Threat Detection and…

How’s Your Frontline? Recruit, Retain, and Optimize your Cybersecurity Team

How’s Your Frontline? Recruit, Retain, and Optimize your Cybersecurity Team

  • Aug 30, 2022

What can we do about the staffing shortage in cybersecurity? With research suggesting that nearly a third of the cybersecurity workforce is planning to leave the industry in the near future, organizations are left in a worrisome position, especially as attack surfaces are growing. So, where do we move forward…

Top Active Directory Attacks and How to Prevent Them

Top Active Directory Attacks and How to Prevent Them

  • Jul 21, 2022

As the most broadly deployed identity service in the world, Active Directory is a lucrative target for cyberattackers. Ransomware-as-a-service groups, including Conti and LockBit 2.0, have become increasingly adept at finding and exploiting security gaps in Active Directory. In this session, Alexandra Weaver, Semperis Solutions Architect, discusses the most common…

Ransomware vs. Active Directory Backups: What Can Throw a Wrench into Your Disaster Recovery Process?

Ransomware vs. Active Directory Backups: What Can Throw a Wrench into Your Disaster Recovery Process?

  • Jul 14, 2022

In a cyber disaster, you must recover Active Directory before you can recover your business. But only one in five organizations have a tested plan in place for recovering AD after a cyberattack. This is alarming given the spike of ransomware attacks and the widespread impact of an AD outage.…

So You’ve Been Breached – What Now?

So You’ve Been Breached – What Now?

Attacks are inevitable and breaches are probable, particularly where your Active Directory is concerned. What is the correct path to take if you have been attacked? Join breach prevention and incident response experts from Semperis as they provide best practices to ensure you recover quickly, completely, and in a more…

Ransomware, Risiko und Wiederherstellung

Ransomware, Risiko und Wiederherstellung

  • May 10, 2022

Ist Ihr zentrales Identitätssystem darauf vorbereitet?

Back to Basics – A Practical Guide to Following the NIST Framework for Ransomware Risk Management

Back to Basics – A Practical Guide to Following the NIST Framework for Ransomware Risk Management

  • May 09, 2022

We all know that ransomware is everywhere and not going away any time soon. Many organizations — from government entities to regulatory bodies and even cybersecurity experts — have provided recommendations, requirements, and mandates to help you protect your organization from the relentless pace of attacks. But making this guidance…

Defending Against Active Directory Attacks That Leave No Trace

Defending Against Active Directory Attacks That Leave No Trace

  • May 02, 2022

Detecting an in-progress cyberattack is an essential component of any security strategy. But it's getting increasingly harder to spot malicious attackers who gain access to information systems through gaps in the identity system, then move stealthily through the environment—often undetected for weeks or months—before dropping malware. To detect identity system…