Securing Your Identity Infrastructure from Insider Threats

Securing Your Identity Infrastructure from Insider Threats

  • Semperis

Cybersecurity strategies tend to focus on external threats. But insider threats are on the rise, increasing by 44% over the past two years. Whether caused by employee negligence or malicious intent, insider-related incidents incur an average cost of $484,931 per event, posing a serious risk to your business. Can your…

Would your Organization Fail an Identity Assessment?

Would your Organization Fail an Identity Assessment?

In this interactive webinar, Kriss will take participants on a journey to explore whether or not their organizations would pass or fail an identity assessment. Drawing from his years of hands-on experience and using Semperis community tools, Kriss will provide valuable insights into common pitfalls, best practices, and real-world examples…

How Semperis Maps to MITRE ATT&CK, Essential8 (AU) & CCoP (SG) Frameworks

How Semperis Maps to MITRE ATT&CK, Essential8 (AU) & CCoP (SG) Frameworks

Security frameworks have been developed by government and security organisations to help companies and governments alike develop a baseline of minimum cybersecurity practices. In this webinar we will explore the Mitre Att&ck framework, as well as Essential8 from Australia and CCoP from Singapore to understand how Semperis technologies map to…

Cybersecurity 2020: The Danger of Ransomware

Top Tips for Minimizing Your Identity Attack Surface

Is your cybersecurity strategy ready for today’s attackers? From finding ways past MFA to hiding from SIEM solutions and security logs, threat actors have become adept at bypassing endpoint and traditional defenses. A layered approach to identity threat detection and response (ITDR) can help you defend your hybrid Active Directory…

AD è diventato l’entry point dei recenti cyberattacks

AD è diventato l’entry point dei recenti cyberattacks

Capiremo come aumentare la nostra postura di sicurezza prima, durante e dopo un attacco.

Strengthen Operational Resilience with Identity Threat Detection and Response (ITDR)

Strengthen Operational Resilience with Identity Threat Detection and Response (ITDR)

Operational resilience today depends on your ability to prevent and quickly recover from the disruptions caused by cyberattacks. For most organizations, identity-first security is the key to such resilience. As Gartner notes, “misused credentials are now the top technique used in breaches…. attackers are targeting Active Directory and the identity…

A Look Back at Last Year – Cyberattacks and Why Active Directory is Central

A Look Back at Last Year – Cyberattacks and Why Active Directory is Central

Cybercrime does in fact pay, but don’t let it cost you. This webinar will look back at the last year of cyber-attacks in the UK and discuss the costs from both a business and monetary perspective - Lose Active Directory, Lose Your Business! Presented by David Hitchen - Semperis Sr…

Recovering AD: The missing piece in your ITDR plan

Recovering AD: The missing piece in your ITDR plan

Identity has become the new security perimeter. With 9 out of 10 cyberattacks involving Active Directory (AD), identity threat detection and response (ITDR) is now a priority for organizations that prize operational resilience. But unless your ITDR strategy includes an AD-specific recovery plan, you aren’t getting the full benefits of…

How to Respond to and Recover from a Cyberattack

How to Respond to and Recover from a Cyberattack

Attacks are inevitable and breaches are probable, particularly where your Active Directory is concerned. What is the correct path to take if you have been attacked? Join breach prevention and incident response experts from Semperis for best practices to ensure you recover quickly, completely, and in a more secure state…

Protect Your Identity Assets with Purple Knight and Forest Druid

Protect Your Identity Assets with Purple Knight and Forest Druid

Identity Threat Detection and Response (ITDR) is one of the most talked-about security trends this year. Why? Because your identity systems—Active Directory (AD) and Azure AD for most organizations—are a Tier 0 asset that hold the keys to all your IT and business operations. That makes AD a juicy target…