Semperis and Dell Present: Ransomware, Risk, and Recovery

Semperis and Dell Present: Ransomware, Risk, and Recovery

Disaster Recovery (DR) strategies have traditionally focused on natural disasters, then expanded into other physical events such as terrorism. Today, cyber weaponization is everywhere, and the "extinction event" is a genuine threat with no respect for geographic boundaries. Presented by 15-time Microsoft MVP and identity security expert Sean Deuby (Semperis…

The Changing Role of Active Directory Engineers in a Cyber-Resilient Organization

The Changing Role of Active Directory Engineers in a Cyber-Resilient Organization

As cyber-attacks increasingly target Active Directory as an initial entry point, the role of AD engineers and architects is rapidly expanding to include security responsibilities. At the same time that AD engineers must secure access to cloud applications, they must also guard against attackers that take advantage of AD configuration…

Retour sur les cyberattaques récentes, l’Active Directory au centre de toutes les attentions

Retour sur les cyberattaques récentes, l’Active Directory au centre de toutes les attentions

Nous présentons un récapitulatif des cyberattaques en France ainsi que des pistes d'améliorations de la sécurité de votre Active Directory avant, pendant et après une cyberattaque.

A CISO Debate: What’s the Achilles Heel of Security in 2021?

A CISO Debate: What’s the Achilles Heel of Security in 2021?

The adoption of cloud-based applications and remote workforces is rapidly changing the threat landscape, and security leaders have been preparing. But no one could have predicted a global pandemic to dramatically accelerate digital transformation and force businesses to adapt literally overnight. In this time of exceptional turbulence, it's even more…

Top 5 Pitfalls to Avoid with Bare-Metal Recovery for Active Directory

Top 5 Pitfalls to Avoid with Bare-Metal Recovery for Active Directory

Disaster recovery programs appreciate bare-metal recovery (BMR) for its promise of fast and convenient full system restores. Gone are the days of re-building servers from scratch. Now, entire servers, complete with operating system, applications, settings, and drivers, are restored with a few clicks. Of course, life is never that simple.…

Windows Group Policy: Powerful Configuration Tool or Hacker’s Best Friend?

Windows Group Policy: Powerful Configuration Tool or Hacker’s Best Friend?

What started as a sleepy technology for efficiently configuring 1000s of Windows desktops and servers, has now become a gold mine for attackers looking to expose your security posture and leverage your GPOs as “malware delivery vehicles”. In this webinar, Darren Mar-Elia (the “GPOGUY”) will summarize the nearly 4 years…

Identity-Centric Healthcare Security: Defending the First Responders

Identity-Centric Healthcare Security: Defending the First Responders

While COVID-19 is disrupting many aspects of daily life, it's not slowing down the proliferation of cyberattacks targeting healthcare organizations, both large and small. This webinar will cover the cybersecurity challenges unique to the healthcare industry and how COVID-19 has raised the stakes. We'll also share real-world stories from authorities…

Healthcare Security Fireside Chat: NIST, Identity, and Ransomware

Healthcare Security Fireside Chat: NIST, Identity, and Ransomware

No one can ignore the sharp uptick of hospitals victimized by ransomware. And in healthcare, the stakes are higher. Just last month, a 78-year-old patient at University Hospital Düsseldorf died after a ransomware attack crippled the hospital's IT systems and forced doctors to attempt to transfer her to another facility.…

A Cyber-First Approach to Disaster Recovery

A Cyber-First Approach to Disaster Recovery

In this era of digital transformation, cyber weaponization is commonplace, and the "extinction event" is a genuine threat, especially for organizations with uptime and availability requirements. As we've seen in the headlines, cyber disasters cripple business operations and impact shareholder value. For instance, Equifax just became the first company to…

Seizing the Castle: A Medieval Battle Technique Workshop

Seizing the Castle: A Medieval Battle Technique Workshop

The cybersecurity industry is not at a loss when it comes to cheesy castle analogies or quoting Sun Tzu whenever it gets the chance (keys to the kingdom, crown jewels, the art of war), you name it we’ve butchered it. But what if we took some time to look at the whole medieval…