- 363
- 7 810 440
Semperis
United States
เข้าร่วมเมื่อ 19 มิ.ย. 2014
Semperis protects critical enterprise identity services for security teams charged with defending hybrid and multi-cloud environments from cyberattacks, data breaches, and operational errors. Purpose-built for securing hybrid identity environments-including Active Directory, Entra ID, and Okta-Semperis’ patented technology protects 100+ million identities across government agencies and the world’s leading enterprises.
As part of its mission to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast, and free identity security tools Purple Knight and Forest Druid. Semperis is a privately owned, international company headquartered in Hoboken, New Jersey, with customers in more than 40 countries.
As part of its mission to be a force for good, Semperis offers a variety of cyber community resources, including the award-winning Hybrid Identity Protection (HIP) Conference, HIP Podcast, and free identity security tools Purple Knight and Forest Druid. Semperis is a privately owned, international company headquartered in Hoboken, New Jersey, with customers in more than 40 countries.
Why is it vital to include AD-specific security in disaster recovery planning
🔒 Mastermind Monday: Why is it vital to include AD-specific security in disaster recovery planning?
This week, Jeff Wichman explains why simply restoring a domain controller isn't enough to achieve a secure and functional recovery after a cyberattack.
💡 Key insights:
Why your DR plan needs to include Active Directory recovery specifics.
The risk of failing to address malicious AD changes.
Strategies for effective and timely Active Directory recovery.
www.semperis.com/
www.linkedin.com/company/Semperis
This week, Jeff Wichman explains why simply restoring a domain controller isn't enough to achieve a secure and functional recovery after a cyberattack.
💡 Key insights:
Why your DR plan needs to include Active Directory recovery specifics.
The risk of failing to address malicious AD changes.
Strategies for effective and timely Active Directory recovery.
www.semperis.com/
www.linkedin.com/company/Semperis
มุมมอง: 24
วีดีโอ
Overcoming Vulnerabilities with Attack Surface Management
มุมมอง 26วันที่ผ่านมา
As the digital landscape expands, managing and securing the attack surface of your organization has never been more crucial. Join us for a hot topics webcast where industry experts will provide a comprehensive forecast of attack surface management (ASM) trends and offer strategic guidance for late 2024 and early 2025. This session will cover emerging threats, advanced ASM techniques, and innova...
Why is Active Directory a preferred target for cyberattacks?
มุมมอง 22วันที่ผ่านมา
This week, Yossi Rachman dives into why Active Directory is the crown jewel for cybercriminals. 💡 Key insights: • 9 out of 10 attacks exploit AD because it holds the "keys to the castle." • Misconfigurations and outdated vulnerabilities make AD an easy target. • Threat actors prioritize AD to gain critical permissions and access sensitive data. Watch now to understand why protecting Active Dire...
Should you pay the ransom after a ransomware attack?
มุมมอง 4114 วันที่ผ่านมา
This week’s cybersecurity insight tackles a tough question: Should you pay the ransom after a ransomware attack? 💡 Our CEO Mickey Bresman breaks down why paying the ransom might not solve the problem-and could even make things worse for your organization and others. 🔑 Key takeaways: -Paying doesn’t guarantee data recovery. -Paying encourages more cyberattacks. -Paying funds operations that harm...
When Every Minute Counts Recovering AD During An Attack
มุมมอง 8228 วันที่ผ่านมา
What do you do when your endpoint or other initial protections are breached? What do you do when intruders are already in your network and have possibly compromised your Active Directory (AD) forest? This is the true story of a ransomware attack-and how it was stopped. Join Semperis' Sean Deuby, 15-time Microsoft MVP alumnus, for lessons from this real-live incident response and attack interven...
Recovering Operations After a Cyberattack
มุมมอง 802 หลายเดือนก่อน
Critical infrastructure organizations that manage operational technology (OT) systems or Internet of Things (IoT) devices face several challenges to effective cybersecurity, including outdated technology, the complexity of diverse environments, and an increased attack surface. Rob Ingenthron (Senior Solutions Architect, Semperis) discusses the challenges organizations face in healthcare, manufa...
Microsoft DART: In the Trenches with Shiva P
มุมมอง 822 หลายเดือนก่อน
Microsoft describes its Detection and Response Team (DART) as the "cybersecurity team we hope you never meet." In this episode of the HIP Podcast, Sean speaks with Shiva P, a Senior Consultant with Microsoft DART. Together, they delve into the tactics used by threat actors and share best practices for minimizing risk. Drawing from his extensive experience in incident response at Microsoft, Shiv...
Recovering Active Directory: The Missing Piece in Your Operational Resilience Plan
มุมมอง 932 หลายเดือนก่อน
Ransomware and cybercrime have become top-tier threats to organizations in every industry. Securing endpoints, buying cyber insurance, even paying ransom-none of these options can prevent a business-ending attack. One step that is key to operational and business resilience: A dedicated, identity-first cybersecurity plan. Industry experts from Government Technology and Semperis explain why the a...
Securing and Recovering Active Directory from a Cyberattack
มุมมอง 2933 หลายเดือนก่อน
Securing and Recovering Active Directory from a Cyberattack
Building a Layered Defense in Cybersecurity
มุมมอง 1113 หลายเดือนก่อน
Building a Layered Defense in Cybersecurity
The CISO’s Take on Identity First Security: Chris Inglis on Redefining the CISO's Role
มุมมอง 1353 หลายเดือนก่อน
The CISO’s Take on Identity First Security: Chris Inglis on Redefining the CISO's Role
The Key to Cyber Resilience: Identity System Defense
มุมมอง 1743 หลายเดือนก่อน
The Key to Cyber Resilience: Identity System Defense
Keynote with Chris Inglis: Insights from the First U.S. National Cyber Director
มุมมอง 293 หลายเดือนก่อน
Keynote with Chris Inglis: Insights from the First U.S. National Cyber Director
Recovering Entra ID Resources and Data with Tuna Gezer
มุมมอง 674 หลายเดือนก่อน
Recovering Entra ID Resources and Data with Tuna Gezer
Protect Active Directory before the Attack
มุมมอง 1715 หลายเดือนก่อน
Protect Active Directory before the Attack
Bringing Active Directory Back from Hell - Initial access and Post-exploit
มุมมอง 1135 หลายเดือนก่อน
Bringing Active Directory Back from Hell - Initial access and Post-exploit
#CyberRiskTV @ Black Hat: Ready1 General Manager Marty Momdjian - #Healthcare #IncidentResponse
มุมมอง 1105 หลายเดือนก่อน
#CyberRiskTV @ Black Hat: Ready1 General Manager Marty Momdjian - #Healthcare #IncidentResponse
Did you know the HIP community is a global powerhouse of #IAM wizards?
มุมมอง 236 หลายเดือนก่อน
Did you know the HIP community is a global powerhouse of #IAM wizards?
The former Deputy Director of the National Security Agency on why Semperis as a Strategic Advisor
มุมมอง 1216 หลายเดือนก่อน
The former Deputy Director of the National Security Agency on why Semperis as a Strategic Advisor
Securing Your Identity Infrastructure from Insider Threats
มุมมอง 1656 หลายเดือนก่อน
Securing Your Identity Infrastructure from Insider Threats
The CISO's Take on Identity-First Security: Former Walmart CISO Kerry Kilker on Last Line of Defense
มุมมอง 1206 หลายเดือนก่อน
The CISO's Take on Identity-First Security: Former Walmart CISO Kerry Kilker on Last Line of Defense
Case Study: Semperis delivers identity threat detection & cyber resilience for global telecom.
มุมมอง 846 หลายเดือนก่อน
Case Study: Semperis delivers identity threat detection & cyber resilience for global telecom.
Once a Cyber Criminal is in...they usually go to Active Directory
มุมมอง 726 หลายเดือนก่อน
Once a Cyber Criminal is in...they usually go to Active Directory
Phases of a Ransomware Attack - Initial access and Post-exploit
มุมมอง 676 หลายเดือนก่อน
Phases of a Ransomware Attack - Initial access and Post-exploit
The CISO's Take on Identity Security: Altice Portugal CSO José Alegria on Ransomware Defense
มุมมอง 1217 หลายเดือนก่อน
The CISO's Take on Identity Security: Altice Portugal CSO José Alegria on Ransomware Defense
The forgotten Art of hiding data in Active Directory - and how adversaries could use it
มุมมอง 1327 หลายเดือนก่อน
The forgotten Art of hiding data in Active Directory - and how adversaries could use it
Lessons Learned from Remediating Large-Scale Cyber Incidents at #HIPGlobal 2023
มุมมอง 577 หลายเดือนก่อน
Lessons Learned from Remediating Large-Scale Cyber Incidents at #HIPGlobal 2023
Harnessing AI for Enhanced Security: Integrating with ChatGPT for Tailored Mitigation Reports
มุมมอง 317 หลายเดือนก่อน
Harnessing AI for Enhanced Security: Integrating with ChatGPT for Tailored Mitigation Reports
Cyber Resilience in Action: Focusing Defenses Where They Matter Most - An Adversarial Perspective
มุมมอง 367 หลายเดือนก่อน
Cyber Resilience in Action: Focusing Defenses Where They Matter Most - An Adversarial Perspective
Practical Security Descriptor Implementations at #HIPGlobal 2023
มุมมอง 837 หลายเดือนก่อน
Practical Security Descriptor Implementations at #HIPGlobal 2023