How to Respond to and Recover from a Cyberattack

How to Respond to and Recover from a Cyberattack

Attacks are inevitable and breaches are probable, particularly where your Active Directory is concerned. What is the correct path to take if you have been attacked? Join breach prevention and incident response experts from Semperis for best practices to ensure you recover quickly, completely, and in a more secure state…

Protect Your Identity Assets with Purple Knight and Forest Druid

Protect Your Identity Assets with Purple Knight and Forest Druid

Identity Threat Detection and Response (ITDR) is one of the most talked-about security trends this year. Why? Because your identity systems—Active Directory (AD) and Azure AD for most organizations—are a Tier 0 asset that hold the keys to all your IT and business operations. That makes AD a juicy target…

Closing Tier 0 Active Directory Attack Paths with Forest Druid

Closing Tier 0 Active Directory Attack Paths with Forest Druid

Active Directory has countless paths adversaries can take to achieve domain dominance. The problem is clear—excessive permissions. But sifting through every group and user relationship is impossible. Forest Druid flips the script, taking an inside-out approach to attack path management. Forest Druid focuses on attack paths leading into the Tier…

Ransomware, Risk, and Recovery: is your Core Identity System Secure?

Ransomware, Risk, and Recovery: is your Core Identity System Secure?

Active Directory is the heart of many organizations' information systems: It's used for identity management by 90 percent of businesses. But this 20-year-old technology is increasingly under attack by cyber-criminals who use AD to gain access to your network--and your data. Recent incidents like the Hafnium attack on Microsoft Exchange…

Think Like a Hacker: Defend Your Organization Against Ransomware-as-a-Service Attacks

Think Like a Hacker: Defend Your Organization Against Ransomware-as-a-Service Attacks

Government agencies are increasingly adopting software-as-a-service (SaaS) and other as-a-service models to modernize service delivery and increase efficiency. Cybercriminals are too. With ransomware-as-a-service (RaaS) tools, bad actors can use already-developed ransomware methods to execute attacks that are smarter, faster and more sophisticated. As concerns about ransomware attacks have grown tremendously…

Come “resuscitare” l’Active Directory dopo un attacco ransomware

Come “resuscitare” l’Active Directory dopo un attacco ransomware

Discutiamo le considerazioni chiave, i potenziali errori e le diverse opzioni da valutare quando si sviluppa un piano di DR (Disaster Recovery) per l'AD.

SCHIMSS Security Webinar

SCHIMSS Security Webinar

  • Semperis

Schimms security roundtable with Semperis Sean Deuby, Jay Mervis, Craig Wright, Jason Prost, Jim Beinlich

How to Get the Best Cyber Insurance by Demonstrating Operational Resiliency

How to Get the Best Cyber Insurance by Demonstrating Operational Resiliency

  • Semperis

Live panel discussion with Ed Amoroso (TAG Cyber), Anthony Dagostino (Converge), and Jim Doggett (Semperis) With the rise of ransomware and cybercrime, having an effective cyber insurance policy in place is part of a layered defense strategy. But the cyber insurance industry is in a state of flux as the…

Resurrecting Active Directory After a Ransomware Attack

Resurrecting Active Directory After a Ransomware Attack

Jorge has been a Microsoft MVP since 2006 with a specific focus on designing, implementing, and securing Microsoft Identity & Access Management (IAM) technologies. Holding various Microsoft certifications, his experience includes Active Directory (AD) design and implementation, training, presenting, developing security-related scripts and tools, and developing and implementing AD and…

Reverse Engineering a Hackers Approach to Breaking into Healthcare

Reverse Engineering a Hackers Approach to Breaking into Healthcare

What do hackers want from healthcare? And how can healthcare CIOs protect vital identity infrastructure from attacks? Guido Grillenmeier, Chief Technologist at Semperis, and Matt Sickles, Solutions Architect at Sirius Healthcare, walk This Week Health through the use of Purple Knight, a free tool for your Identity Threat Detection and…