With the ever-expanding ecosystem of remote work, cloud services, and connected devices, it's increasingly important to keep identities secure. Enter Semperis, protecting the heart of your identity infrastructure so you can go forth boldly into the digital future. Sit and watch a while.

 

Securing and Recovering Active Directory from a Cyberattack

Bringing AD Back from Hell

Protecting AD: The foundation of your Zero Trust identity strategy

Snackable Active Directory Security: 30 Minutes a Day Keeps the Bad Guys Away

Identity System Defense for the Healthcare Industry

Active Directory Security Pro Tip to Staying ahead of Ransomware Attacks that Exploit AD

The CISO’s Take on Identity-First Security: Chris Inglis on Redefining the CISO's Role

The CISO's Take on Identity Security: Altice Portugal CSO José Alegria on Ransomware Defense

The CISO's Take on Identity-First Security: Former Walmart CISO Kerry Kilker on the Last Line of Defense

The CISO's Take on Identity-First Security: Former bp CISO Simon Hodgkinson Talks Cyber Resilience

Strengthening Identity System Defense at Global Telecom Company Altice

Customer Spotlight: AMOCO Federal Credit Union

Customer Spotlight: Prime Healthcare

The Key to Cyber Resilience: Identity System Defense

CRA TV @ Black Hat: Ready1 General Manager Marty Momdjian

Security Weekly interview at RSAC: Semperis CISO, Jim Doggett

Successful Active Directory Modernization

The Last Line of Defense: Cyber Resiliency for Active Directory

CEO Mickey Bresman sits down with SC Magazine at RSA 2023

What Is Identity Threat Detection and Response?

#VideoInterview: Infosec22 - Guido Grillenmeier

A CISO Debate: What's the Achilles Heel of Security in 2021?

Strengthening Business Through Cyber Incident Preparedness

Tabletop to Reality: Building Cyber-Resilience Through Incident Response Drills

Webinar with iC Consult - Why is Your AD an Easy Target for Hackers? And what you can do about it!

Overcoming Vulnerabilities with Attack Surface Management

How to Recover Active Directory When Every Second Counts

When Every Minute Counts Recovering AD During An Attack

Business Continuity and Identity System Recovery

Recovering Active Directory: The Missing Piece in Your Operational Resilience Plan

Recovering Operations After A Cyberattack

Don't Panic! It's Just A Cyber Incident

Layered Defense in Cybersecurity

Protect & Recover AD/Entra ID — The Keys to the Kingdom

Are You Prepared for the True AD Disaster?

Top Tips for Active Directory Modernization

Would Your Organization Fail the Active Directory Security Assessment

Is Your Identity System Defense Ready?

Cyberattacks on Education: How to Strengthen Identity Security

5 Identity Vulnerabilities every CISO must know!

Can Your Organization Pass an Identity Security Assessment?

Identity Security for the Public Sector: Protecting Active Directory

What does a successful Identity Threat Detection and Response (ITDR) strategy look like?

Securing Your Identity Infrastructure from Insider Threats

Would Your Organization Fail an Identity Assessment?

How Semperis Maps to MITRE ATT&CK, Essential8 (AU) & CCoP (SG) Frameworks

Strengthen Operational Resilience with Identity Threat Detection and Response (ITDR)

Top Tips for Minimizing Your Identity Attack Surface

The Dos and Don'ts of Recovering Active Directory from a Scorched Earth Disaster

The Changing Role of Active Directory Engineers in a Cyber-Resilient Organization

The Top 10 Actions Every Organization Should Take to Protect their AD from Attacks

A Cyber First Approach to Disaster Recovery

Healthcare Security Fireside Chat: NIST, Identity, and Ransomware - Scott Breece and Gil Kirkpatrick

Identity-Centric Healthcare Security Defending the First Responders

So, You've Been Breached, What Now

Ransomware, Risk, & Recovery Presentation: Is Your Core Identity System Ready?

Governance, Risk, and Compliance—and ITDR

Top AD Attacks and How to Prevent Them

Protect Your Hybrid AD Environment

Resurrecting Active Directory After a Ransomware Attack

Ransomware, Risk, and Recovery

Ransomware vs.Active Directory Backups: What Can Throw a Wrench Into Your Disaster Recovery Process

Stepping Up Your Active Directory Defenses: Lessons Learned from Recent Attacks Like PrintNightmare

Why Active Directory Security is Critical to Cybersecurity

Active Directory Hybrid Cloud Management - Top Security Risks to Watch For

A look back at recent cyberattacks with Active Directory as the centre of attention

Defending Against Active Directory Attacks That Leave No Trace

Securing Active Directory — The Key Entry Point in Recent Cyberattacks

How We Recovered AD from Cyberattack Hell

How Attackers Exploit Active Directory: Lessons Learned from High-Profile Breaches

Evaluating Identity Threat Detection and Response (ITDR) Solutions

Detect Possible Ransomware and Blackmail Attacks Before They Strike

Cyberattacks: 2021 in Review and 2022 Trends and Predictions

Reverse Engineering a Hackers Approach to Breaking Into Healthcare

DCShadow Attack Demonstration

How's Your Front Line? Recruit, Retain, and Optimize your Cybersecurity Team

So You've Been Breached - What Now

What You Need to Know About Securing Active Directory

Seizing the Castle: A Medieval Battle Technique Workshop with Chris Roberts and Darren Mar-Elia

Attacking and Defending AD Workshop

Windows Group Policy Powerful Configuration Tool or Hackers Best Friend

Top 5 Pitfalls to Avoid with Bare Metal Recovery for AD

Back to Basics – A Practical Guide to Following the NIST Framework for Ransomware Risk Management

Overview: DSP, ADFR, Purple Knight

ADFR Malware Proof your Backup

DS Protector 3.0

Recovering Active Directory cleanly, without re-introducing malware

Accelerate Incident Response

Automate Forest Recovery with Semperis ADFR

DSP Intelligence Video Intro

Semperis OSP 2.0

Automate VM Provisioning for Forest Recovery with Semperis ADFR

DSP - Minimizing The Attack Surface

DSP Accelerating AD Incident Response

DSP Undo Mailcious Changes

DSP Detect Advanced Attacks