Securing Active Directory in a Hybrid Identity Environment

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Active Directory (AD) access points are frequently used to launch cyber-attacks and adequately securing these systems has become increasingly critical to organizations’ security, particularly amid the shift to hybrid working.

This webinar will focus on this exact topic, with a panel of experts highlighting how cyber-criminals have successfully targeted AD and offering guidance on how to secure this area. This will include the security risks to watch for in managing AD as well as Azure AD, how to look for warning signs that your core identity-management system has been compromised, and how your business should respond in the event of a successful attack. The panel will also exchange real life experiences with securing AD and Azure AD and the challenges they overcame.

Attendees will learn:

  •  The common AD and Azure AD weak spots exploited in recent cyber-attacks 
  • Top security risks to watch for in managing a hybrid identity environment 
  • Preparing for AD and AAD attack remediation 
  • How to enabling proper backup and recovery procedures for either environment


James Coker

Reporter, Infosecurity Magazine

Guido Grillenmeier

Chief Technologist, Semperis

Dominic Grunden

CISO for UnionDigital Bank and ClubCISO Member

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Semperis's privacy policy here: Please see Infosecurity Magazine’s privacy policy for additional information.