Back to Webinar
Latest Sponsored Events
Related Videos
Webinar Recording
Sep 28, 2022
Ensuring the Security of Microsoft Active Directory and Azure AD

In the face of increasing cyber-attacks by cybercriminals and nation-states, most organizations are investing in filling in the gaps in their cyber defenses, but as the landmark SolarWinds supply chain breach showed, securing Microsoft Active Directory (AD) is vital, but often overlooked. Join Microsoft identity experts from KuppingerCole Analysts and Semperis as they discuss the critical role of AD and Azure AD in security. Learn why these environments are a common target for attackers, the types of security risks that are often exploited, the challenges to securing a hybrid AD environment, and how to mitigate vulnerabilities.

Martin Kuppinger, Principal Analyst at KuppingerCole, who brings decades of experience in Microsoft AD, will explain why it is essential to protect Active Directory and Azure AD. He will also look at the need to integrate identity and cybersecurity initiatives across the organization, rather than placing AD security in a silo. Guido Grillenmeier, Chief Technologist at Semperis, will discuss the most common vulnerabilities in AD configurations, the dangers they present, and how to fix them. He will also discuss password policies, elevated privileges, delegated permissions, and weaknesses in Kerberos usage as well as give an overview of the Purple Knight AD assessment tool.

Webinar Recording
Jul 13, 2018
Active Directory Disaster Recovery

Active Directory has grown both in importance and complexity in recent years, with businesses have become increasingly dependent on AD for authentication and authorization of mobile workforce and cloud-based applications. The new AD usage landscape has introduced greater complexity to the enterprise IT environment, raising the risk of AD disasters tied to human error and cyberattack. More and more frequently, attackers are using AD as an attack vector to compromise enterprises and, in some severe cases, wiping out the entire IT environment.