Hybrid Identity Protection Podcast
Episodes
Securing Non-Human Identities in the Age of Agentic AI with Sarah Cecchetti, Director of Product Management at Semperis
28 Apr 2026
Contributed by Lukas
This episode features Sarah Cecchetti, Director of Product Management at Semperis.A veteran identity executive, Sarah co-founded IDPro and co-authored...
1 Thing to Do to Avoid a Breach: 5 Identity Experts Answer
14 Apr 2026
Contributed by Lukas
This episode features a virtual roundtable hosted by Michele Crockett, Associate VP of Product Marketing at Semperis.The panel brings together five pr...
Governance After the Fact: The Hidden Risk of App Sprawl with Sander Berkouwer and Raymond Comvalius, Microsoft MVPs
31 Mar 2026
Contributed by Lukas
This episode features Sander Berkouwer and Raymond Comvalius, two longtime identity security experts and Microsoft Most Valuable Professionals (MVPs)....
130 MPH Decisions: What Drag Racing Teaches About Incident Response with Krista Arndt, Associate CISO at SLUHN
17 Mar 2026
Contributed by Lukas
This episode features Krista Arndt, Associate CISO at St. Luke’s University Health Network.With a career spanning healthcare, finance, crypto, and t...
Is Active Directory Dead? The Future of Microsoft AD with Cliff Fisher, Senior Solutions Architect at Semperis
03 Mar 2026
Contributed by Lukas
This episode features Cliff Fisher, Senior Solutions Architect at Semperis and former Senior Technical Program Manager on Microsoft’s Active Directo...
How a Single Breach Can Turn into a Full Compromise with Tim Beasley, Senior Incident Response Consultant at Semperis
17 Feb 2026
Contributed by Lukas
This episode features Tim Beasley, a Senior Incident Response Consultant at Semperis with decades of experience in compromise recovery and post-breach...
Rethinking the Human Factor in Identity Security with World-Leading Cyberpsychologist, Dr. Mary Aiken
03 Feb 2026
Contributed by Lukas
This episode features Dr. Mary Aiken, Professor of Cyberpsychology at Capitol Technology University and one of the world’s leading experts on the im...
Stopping Ransomware at the Backup Layer with Andy Drag, Staff Product Manager at Cohesity
20 Jan 2026
Contributed by Lukas
This episode features Andy Drag, Product Manager at Cohesity.With a background in systems administration and two managed service provider startups, An...
Inside HIP Conf 2025 with Guido Grillenmeier, Semperis Principal Technologist
06 Jan 2026
Contributed by Lukas
This episode features host Sean Deuby and fellow Semperis colleague Guido Grillenmeier, Principal Technologist, EMEA, in a candid recap of the 2025 Hy...
Fixing Legacy AD Risk in a Hybrid World with Christopher Brumm, Cyber Security Architect at glueckkanja AG
16 Dec 2025
Contributed by Lukas
This episode features Christopher Brumm, Cyber Security Architect at glueckkanja AG.With 15+ years in IT security, Chris has worked across Microsoft’...
The Anatomy of Attack Path Management with Daniel Stefaniak, VP Architect - Cybersecurity and Identity at JPMorgan Chase
02 Dec 2025
Contributed by Lukas
This episode features Daniel Stefaniak, Vice President Architect - Cybersecurity and Identity at JPMorgan Chase.With deep experience as an IT architec...
Beyond Firewalls: The People Behind Cyber Resilience with Nathan Wenzler, Field CISO at Optiv
18 Nov 2025
Contributed by Lukas
This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv.With nearly 30 years of experience leading cybersecurity progr...
The DNA of Organizational Resilience: Leadership First, Technology Last with Heather Costa, Director of Technology Resilience at Mayo Clinic
04 Nov 2025
Contributed by Lukas
This episode features Heather Costa, Director of Technology Resilience at Mayo Clinic. With over two decades of experience building resilience progra...
The Cyber War We Can’t See with Dr. Chase Cunningham, CSO of Demo-Force.com
21 Oct 2025
Contributed by Lukas
This episode features Dr. Chase Cunningham, Chief Strategy Officer at Demo-Force.com.Widely known as “Dr. Zero Trust”, he’s the creator of the Z...
The Human Side of Cyber Resilience with Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity
07 Oct 2025
Contributed by Lukas
This episode features Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity.A founding member of Cohesity’s Security Center of ...
Inside the Snowden Breach with Chris Inglis, Former Deputy Director of the NSA
23 Sep 2025
Contributed by Lukas
This episode features Chris Inglis, former U.S. National Cyber Director and longtime Deputy Director of the NSA.With over 40 years in national securit...
The Hidden Dangers of AD CS with Jake Hildreth, Principal Security Consultant at Semperis
09 Sep 2025
Contributed by Lukas
This episode features Jake Hildreth, Principal Security Consultant at Semperis.With nearly 25 years of IT experience, Jake has seen how Active Directo...
When Change Becomes the Biggest Threat with Edward Amoroso, CEO of TAG Infosphere
26 Aug 2025
Contributed by Lukas
This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer.With decades of experience securing complex infrast...
Getting Rid of ADFS featuring Sander Berkouwer
21 Jul 2025
Contributed by Lukas
Sean is joined by identity expert Sander Berkouwer to explore the evolving landscape of enterprise authentication. Active Directory Federation Service...
One Account, $1.4 Billion: Inside the Merck NotPetya Breach with Lance Peterman, CIDPRO
29 May 2025
Contributed by Lukas
The 2017 NotPetya cyberattack remains one of the most devastating and costly breaches in history, inflicting over $1.4 billion in damages on pharmaceu...
CISOs are the Top of the Information Security Food Chain with Allan Allford
21 Apr 2025
Contributed by Lukas
In this time of constant cyber-attacks and increased cybersecurity reporting requirements, a CISO's job is no easy task and typically has a short Tenu...
Where IAM Is Heading with Joe Kaplan
17 Mar 2025
Contributed by Lukas
How is IAM—and the role of the identity security professional—adapting to meet the challenges of today's threat landscape? In this episode of the ...
Microsoft DART: In the Trenches with Shiva P
22 Nov 2024
Contributed by Lukas
Microsoft describes its Detection and Response Team (DART) as the "cybersecurity team we hope you never meet." In this episode of the HIP Podcast, Sea...
Recovering Entra ID Resources and Data with Tuna Gezer
26 Sep 2024
Contributed by Lukas
Following a cyber incident that compromises Entra ID, an inability to recover critical objects and conditional access policies can bring your business...
Lessons Learned from Large-Scale Cyberattacks with HIP Experts
08 Feb 2024
Contributed by Lukas
This week, the HIP Podcast revisits HIP Global 2023! Listen in as our hybrid identity protection experts present lessons learned in the field, helping...
Acing Active Directory Migration with Michael Masciulli
25 Jan 2024
Contributed by Lukas
Anyone who has dealt with the technological side of a merger or consolidation can tell you: Years of technical debt in Active Directory can turn the p...
Outsmarting Cyber Threats in Education with BJ Welsh
27 Oct 2023
Contributed by Lukas
Cyberattacks against K-12 schools have soared, tripling between 2018 and 2021 and continuing to climb. With many school districts balancing legacy tec...
The State of Security with Brian Desmond
31 Aug 2023
Contributed by Lukas
What are in-the-trenches pros observing when it comes to Active Directory and identity security in 2023? Ravenswood Technology Group Principal returns...
Optimizing Cyber Insurance with Jason Rebholz
10 Aug 2023
Contributed by Lukas
“[Attackers] don’t hack in, they log in.” In this episode of the HIP Podcast, Sean talks with Jason Rebholz, Corvus Insurance CISO and host of t...
Tracking Cybercrime with Andy Greenberg
15 Jun 2023
Contributed by Lukas
Tracking Tier 0 Attack Paths with Ran Harel
02 Mar 2023
Contributed by Lukas
Who really has access to your applications and critical infrastructure? You’ve probably heard that identity is the new security perimeter. But how f...
Optimizing Your Security Budget with Jim Doggett
12 Jan 2023
Contributed by Lukas
Budgets are tight in 2023. Where should CISOs focus their spending to best promote cyber and operational resilience? In this episode of the HIP Podcas...
Protecting Critical Infrastructure from Cyberattacks with Jerry Cochran
15 Dec 2022
Contributed by Lukas
What are the biggest cybersecurity threats to critical infrastructure? And just what do we mean when we talk about “critical infrastructure,” anyw...
Cloud Services Access Challenges with Garret Grajek
01 Dec 2022
Contributed by Lukas
The rapid proliferation of cloud services has opened doors to many advancements in the ways we work. Unfortunately, governance of access to those serv...
Planning for a Cyber Crisis with HIP France Panel Experts
17 Nov 2022
Contributed by Lukas
Join hybrid identity protection experts as they discuss the importance of disaster recovery planning to maintain operational resilience. Where should ...
The "Critical Quad" of Security with Alan Sugano
03 Nov 2022
Contributed by Lukas
What keeps Alan Sugano, President of ADS Consulting Group, up at night? Business email compromise (“way more lucrative than a ransomware attack”),...
Updating Disaster Recovery Plans with HIP London Panel Experts
13 Oct 2022
Contributed by Lukas
In this episode, listen in on the expert panel recorded live at HIP London, the first stop on this year's Hybrid Identity Protection Roadshow in June ...
Building a Better Identity Security Posture with Maarten Goet
29 Sep 2022
Contributed by Lukas
Do you have a clear picture of your identity security posture—the good and the not-so-great? In this episode of the HIP Podcast, Sean talks with Maa...
The Real-World State of ITDR with Brian Desmond
08 Sep 2022
Contributed by Lukas
Everyone’s talking about Identity Threat Detection and Response (ITDR) … but what does that mean for people in the IT trenches? In this session, S...
Reckoning with Ransomware as a Service (RaaS) with Alix Weaver
25 Aug 2022
Contributed by Lukas
Recent reports indicate a decrease in ransomware attacks. Should organizations breathe a sigh of relief—or batten down the hatches? In this episode,...
Is Cloud Security an Oxymoron?
11 Aug 2022
Contributed by Lukas
Is cloud security an oxymoron? In this panel session, originally recorded at the inaugural HIP Europe event, Sean Deuby talks with Semperis Chief Tech...
Securing Digital Identities with Julie Smith
21 Jul 2022
Contributed by Lukas
How successful are recent efforts to elevate identity security among enterprises across the United States? IDS Alliance surveyed 500+ security and ide...
Scaling Identity for the Future with Denis Ontiveros Merlo
07 Jul 2022
Contributed by Lukas
Security architectures depend on identity—the “new security boundary.” Yet despite investment in identity and attempts to drive a sustainable id...
What You Should Know About Azure AD Security with Dr. Nestori Syynimaa
23 Jun 2022
Contributed by Lukas
The AADInternals toolkit is a powerful resource for administering and hacking Azure AD. In this episode of the HIP Podcast, Sean talks with Dr. Nestor...
Achieving Operational Resilience with Simon Hodgkinson
03 Jun 2022
Contributed by Lukas
Hopefully, your organization has a disaster recovery plan. But do you have a plan for operational resilience? In this HIP Podcast session, Simon Hodgk...
Solving the Application Security Challenge with Daniel Stefaniak
19 May 2022
Contributed by Lukas
What does flossing your teeth and combatting application security vulnerabilities have in common? We find out in this session of the IP Podcast, featu...
Supporting the Identity Pro Community with Daniel Stefaniak
05 May 2022
Contributed by Lukas
Application security got you down? In this session of the HIP Podcast, Sean Deuby talks with Daniel Stefaniak, Sr Product Manager for IAM, Domino Data...
Prescriptive Identity Security for Healthcare Organizations with Marty Momdjian
21 Apr 2022
Contributed by Lukas
The life-or-death demands of the healthcare industry complicate identity security. The COVID-19 pandemic, increasing popularity of remote care and Int...
So, You’ve Been Breached, What Now? Best Practices for Post-Breach Recovery with Yishai Gerstle
07 Apr 2022
Contributed by Lukas
In today’s world, attacks are inevitable, and breaches are probable. The temptation to return to normal operations as quickly as possible is real, b...
Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More with Brian Desmond
24 Mar 2022
Contributed by Lukas
What should you tackle first in locking down Active Directory from cyberattacks? In this webinar excerpt, Sean Deuby (Semperis Director of Services) a...
From EDR to XDR to Identity with Paul Lanzi
10 Mar 2022
Contributed by Lukas
Endpoint detection and response (EDR) is quickly evolving into extended detection and response (XDR). That means that identity is moving to the center...
Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano
24 Feb 2022
Contributed by Lukas
Protection from ransomware often starts with preventing unapproved applications from running on systems. However, the ability to restrict which applic...
Defining the Decision-Making Process for Cyberattack Incident Response with Benjamin Cauwel
10 Feb 2022
Contributed by Lukas
When cybercriminals take down your organization, you might have your technical response plan locked and loaded. But who's calling the shots on when to...
Active Directory Disaster Recovery Revisited for 2022 with Guido Grillenmeier and Gil Kirkpatrick
27 Jan 2022
Contributed by Lukas
What has changed about Active Directory disaster recovery since Gil Kirkpatrick and Guido Grillenmeier—aka the "Masters of Disaster"—first wrote t...
Protecting Your Organization from Third-Party Security Risks with Heinrich Smit
13 Jan 2022
Contributed by Lukas
Are your organizations' systems at risk from third-party security breaches? The threat of cyberattacks that enter systems through compromises in third...
Preventing Holiday Cyberattacks with Elad Shamir
16 Dec 2021
Contributed by Lukas
Is your organization ready to defend against a cyberattack that hits over the holidays? Threat actors love to pounce during the holiday season because...
Protecting Privileged Identities and DevOps Pipelines in Microsoft Azure with Thomas Naunheim
02 Dec 2021
Contributed by Lukas
In a cloud environment, securing privileged identities and DevOps pipelines with privileged access requires special attention. In this session, Sean D...
Common Misconceptions About Azure AD Backup and Recovery with Doug Davis
11 Nov 2021
Contributed by Lukas
Shifting to Azure Active Directory means you're done with worrying about backups, right? Not necessarily. As the Azure cloud service provider, Microso...
The Active Directory Connection in Exchange Attacks, Wiper Attacks, and the Kaseya Attacks
28 Oct 2021
Contributed by Lukas
In this excerpt from a web seminar, Sean and Michele Crockett (Semperis Senior Director of Product Marketing) dive into the tight link between Exchang...
The COBOL Challenge: Who Will Maintain Legacy Systems? With Orin Thomas
14 Oct 2021
Contributed by Lukas
As most newly minted technology pros gravitate toward the latest and coolest programming languages and projects, serious questions arise about who wil...
Defending Against PrintNightmare and PetitPotam Vulnerabilities
30 Sep 2021
Contributed by Lukas
In this session excerpted from a web seminar, Sean Deuby (Semperis Director of Services) and Michele Crockett (Semperis Senior Director of Product Mar...
Managing Security in Active Directory vs Azure Active Directory with Doug Davis
16 Sep 2021
Contributed by Lukas
Recent cyberattacks (including the SolarWinds breach) have involved gaining entry into on-premises Active Directory and then moving to Azure Active Di...
Breaking Down Microsoft Security Offerings with Alexander Benoit
02 Sep 2021
Contributed by Lukas
Sean talks with Alexander Benoit, CEO of dinext pi-sec, about how Microsoft security offerings have changed with the company's adoption of the extende...
Emerging Trends in Securing Digital Identities with Julie Smith of IDSA
19 Aug 2021
Contributed by Lukas
How have identity security practices changed in the last year? Semperis Director of Services Sean Deuby chats with Julie Smith, executive director of ...
What to Do Before, During, and After a Cyberattack with Ben Cauwel of Accenture
03 Aug 2021
Contributed by Lukas
What's the worst time to plan for a cyberattack? When you're actively under attack. Sean talks with Ben Cauwel, Senior AD Security Delivery Manager at...
The Future of Identity | LIVE Panel from HIP Europe 2021
22 Jul 2021
Contributed by Lukas
Are passwords really dead? Tune in to this lively conversation among some of the leading luminaries of identity and access management as they debate c...
Is Cloud Security an Oxymoron? | LIVE Panel from HIP Europe 2021
08 Jul 2021
Contributed by Lukas
Is cloud security an oxymoron? In this panel session, featured in the inaugural HIP Europe 2021, moderators Sean Deuby and Guido Grillenmeier discuss ...
Goodbye Passwords: The Future of Identity with John Craddock
24 Jun 2021
Contributed by Lukas
How do we prove who (or what) we are when accessing accounts in the age of multiple cloud services? Passwords are "a nightmare," says John Craddock, l...
Securing Active Directory vs. Securing Azure Active Directory with John Savill
10 Jun 2021
Contributed by Lukas
What's the difference between on-premises Active Directory and Azure Active Directory? Pretty much everything, particularly when it comes to security....
What to Expect at HIP Europe with Guido Grillenmeier
27 May 2021
Contributed by Lukas
Tune in as Sean Deuby is joined by Guido Grillenmeier (Semperis Chief Technologist) to discuss the European debut of the award-winning Hybrid Identity...
The Power of Azure Sentinel with Rod Trent
13 May 2021
Contributed by Lukas
In this episode, Sean is joined by Doug Davis (Semperis Senior Product Manager) and Rod Trent (Microsoft Security Cloud Solution Architect and Global ...
Evolving Security Teams in the Zero Trust Era with CISO Jim Doggett
29 Apr 2021
Contributed by Lukas
The role of the identity team in an organization has evolved over time, becoming a central component of the security infrastructure in the era of Zero...
Battling Hafnium & Microsoft Exchange Exploits with Alan Sugano
15 Apr 2021
Contributed by Lukas
The attacks on Microsoft Exchange Server around the world by Hafnium have affected tens of thousands of organizations. In this session, Semperis Direc...
Identifying Gaps in Your AD Recovery Plan
01 Apr 2021
Contributed by Lukas
Sean is joined by Alexandra Weaver (Semperis Solutions Architect) to discuss Active Directory forest recovery in the context of a comprehensive Busine...
Breaking Down Identity Updates From Microsoft Ignite with Doug Davis
18 Mar 2021
Contributed by Lukas
Are passwords dead? In this session, Sean Deuby and Doug Davis (Semperis, Senior Product Manager) discuss Microsoft's recent announcements at Ignite a...
Securing Your Legacy Apps with Roelf Zomerman
04 Mar 2021
Contributed by Lukas
Sean is joined by Microsoft Cloud Solution Architect, Roelf Zomerman, to discuss the user benefits of having both on-premises + cloud apps i...
Future Proofing Identity Security Panel with Julie Smith, Siddharth Bhai, and Gil Kirkpatrick
11 Feb 2021
Contributed by Lukas
Looking towards tomorrow’s best identity security practices based on the evolving landscape of today, this panel discussion dives into identity acce...
Hacking Identity Panel with Chris Roberts, Wim van den Heijkant, and David Raviv
28 Jan 2021
Contributed by Lukas
Flashback with us to the Hacking Identity panel from the third-annual HIP Conference, as guest host David Raviv (founder of the New York Information S...
Hybrid Identity Security Panel with Brian Desmond, Joe Kaplan, and Jorge de Almeida Pinto
14 Jan 2021
Contributed by Lukas
What does efficient hybrid identity protection look like? Are you under the impression that your organization is too large to go passwordless? In this...
Crisis Management Panel with Jules Okafor, Kat Sweet, and Guido Grillenmeier
23 Dec 2020
Contributed by Lukas
While companies face the advent of widespread ransomware attacks, they must be well prepared with readied crisis management planning. A cybersecurity ...
Exploring the Future of Identity Standards with Pamela Dingle
10 Dec 2020
Contributed by Lukas
Pamela Dingle, Microsoft Director of Identity Standards and founding member of Women in Identity, joins Sean for an overview of why identity standards...
The Origin Story of the HIP Conference | Special HIP 2020 Edition
16 Oct 2020
Contributed by Lukas
Days before the third annual Hybrid Identity Protection conference commences, some of the original figures from the former DEC (Directory Experts Conf...
Becoming Identity-Aware with Identity Defined Security Alliance
24 Sep 2020
Contributed by Lukas
In a recent report from Identity Defined Security Alliance, 79% of enterprises surveyed suffered an identity breach in the past two years. For episode...
Hope Is Not a Strategy: The Security Blueprint for Startups, SMBs, and Beyond
10 Sep 2020
Contributed by Lukas
In this week's episode, we have Dominic Vogel, the Founder & Chief Strategist at CyberSC, walking through the mistakes and cybersecurity misconcep...
The Expert Guide to Azure AD Connect
04 Sep 2020
Contributed by Lukas
In Episode 9, Jorge de Almeida Pinto talks with Sean about all things Azure AD Connect, your link between Active Directory and Azure AD...
Operating in the Age of Zero Trust and Machine Learning
20 Aug 2020
Contributed by Lukas
The rapid shift in priorities among today’s enterprises is leaving security professionals applying these zero trust— “trust no-one, verify every...
Choosing the Right Security Solution, Not the Temporary One
14 Aug 2020
Contributed by Lukas
Nothing is as permanent in IT as a temporary solution. Sander Berkouwer, 11-time Microsoft MVP and CTO of SCCT, joins Sean on the Hybrid Identity Prot...
Weaning Yourself Away From GUI-Based AD Administration
17 Jul 2020
Contributed by Lukas
Continuous learning when it comes to being an AD Admin is a requirement as they’re tasked with adapting to maintain relevancy. Mike Kanakos (Senior ...
Coping With User Demand
30 Jun 2020
Contributed by Lukas
When the forecasting and planning for 2020 couldn’t call for what was in store, Microsoft became tasked with quickly catch up to the demand necessar...
Managing and Securing Cloud-Only Accounts in Your Hybrid Environment
10 Jun 2020
Contributed by Lukas
Today’s guest on The HIP Podcast is Microsoft Cloud Specialist, Allen Brokken. As an expert in leveraging hybrid cloud techniques, Allen shares the ...
Keeping a Security-First Mindset in a "Get It Done Fast" World
21 May 2020
Contributed by Lukas
In times of rapid change, security tends to take a back seat. And good hackers never waste a crisis. So, how are the pros managing remote access secur...
Cover Your SAAS: Getting a Handle on Access and Activity in a Cloud-Focused World
06 May 2020
Contributed by Lukas
With remote workforces accelerating digital transformation, security teams are shifting their mindset from controlling assets to managing access. This...
Provisioning Identities with Security First Frame of Mind in the Hybrid IT Environment
16 Apr 2020
Contributed by Lukas
In this premiere episode of the HIP Podcast, host Sean Deuby is joined by IAM, Senior Security Engineer Lead at Delta Airlines, Andrew Cedergren. Havi...