Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Hybrid Identity Protection Podcast

Technology Business Education

Activity Overview

Episode publication activity over the past year

Episodes

Securing Non-Human Identities in the Age of Agentic AI with Sarah Cecchetti, Director of Product Management at Semperis

28 Apr 2026

Contributed by Lukas

This episode features Sarah Cecchetti, Director of Product Management at Semperis.A veteran identity executive, Sarah co-founded IDPro and co-authored...

1 Thing to Do to Avoid a Breach: 5 Identity Experts Answer

14 Apr 2026

Contributed by Lukas

This episode features a virtual roundtable hosted by Michele Crockett, Associate VP of Product Marketing at Semperis.The panel brings together five pr...

Governance After the Fact: The Hidden Risk of App Sprawl with Sander Berkouwer and Raymond Comvalius, Microsoft MVPs

31 Mar 2026

Contributed by Lukas

This episode features Sander Berkouwer and Raymond Comvalius, two longtime identity security experts and Microsoft Most Valuable Professionals (MVPs)....

130 MPH Decisions: What Drag Racing Teaches About Incident Response with Krista Arndt, Associate CISO at SLUHN

17 Mar 2026

Contributed by Lukas

This episode features Krista Arndt, Associate CISO at St. Luke’s University Health Network.With a career spanning healthcare, finance, crypto, and t...

Is Active Directory Dead? The Future of Microsoft AD with Cliff Fisher, Senior Solutions Architect at Semperis

03 Mar 2026

Contributed by Lukas

This episode features Cliff Fisher, Senior Solutions Architect at Semperis and former Senior Technical Program Manager on Microsoft’s Active Directo...

How a Single Breach Can Turn into a Full Compromise with Tim Beasley, Senior Incident Response Consultant at Semperis

17 Feb 2026

Contributed by Lukas

This episode features Tim Beasley, a Senior Incident Response Consultant at Semperis with decades of experience in compromise recovery and post-breach...

Rethinking the Human Factor in Identity Security with World-Leading Cyberpsychologist, Dr. Mary Aiken

03 Feb 2026

Contributed by Lukas

This episode features Dr. Mary Aiken, Professor of Cyberpsychology at Capitol Technology University and one of the world’s leading experts on the im...

Stopping Ransomware at the Backup Layer with Andy Drag, Staff Product Manager at Cohesity

20 Jan 2026

Contributed by Lukas

This episode features Andy Drag, Product Manager at Cohesity.With a background in systems administration and two managed service provider startups, An...

Inside HIP Conf 2025 with Guido Grillenmeier, Semperis Principal Technologist

06 Jan 2026

Contributed by Lukas

This episode features host Sean Deuby and fellow Semperis colleague Guido Grillenmeier, Principal Technologist, EMEA, in a candid recap of the 2025 Hy...

Fixing Legacy AD Risk in a Hybrid World with Christopher Brumm, Cyber Security Architect at glueckkanja AG

16 Dec 2025

Contributed by Lukas

This episode features Christopher Brumm, Cyber Security Architect at glueckkanja AG.With 15+ years in IT security, Chris has worked across Microsoft’...

The Anatomy of Attack Path Management with Daniel Stefaniak, VP Architect - Cybersecurity and Identity at JPMorgan Chase

02 Dec 2025

Contributed by Lukas

This episode features Daniel Stefaniak, Vice President Architect - Cybersecurity and Identity at JPMorgan Chase.With deep experience as an IT architec...

Beyond Firewalls: The People Behind Cyber Resilience with Nathan Wenzler, Field CISO at Optiv

18 Nov 2025

Contributed by Lukas

This episode features Nathan Wenzler, Field Chief Information Security Officer at Optiv.With nearly 30 years of experience leading cybersecurity progr...

The DNA of Organizational Resilience: Leadership First, Technology Last with Heather Costa, Director of Technology Resilience at Mayo Clinic

04 Nov 2025

Contributed by Lukas

This episode features Heather Costa, Director of Technology Resilience at Mayo Clinic. With over two decades of experience building resilience progra...

The Cyber War We Can’t See with Dr. Chase Cunningham, CSO of Demo-Force.com

21 Oct 2025

Contributed by Lukas

This episode features Dr. Chase Cunningham, Chief Strategy Officer at Demo-Force.com.Widely known as “Dr. Zero Trust”, he’s the creator of the Z...

The Human Side of Cyber Resilience with Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity

07 Oct 2025

Contributed by Lukas

This episode features Jonathon Mayor, Principal Security Consultant for the Americas at Cohesity.A founding member of Cohesity’s Security Center of ...

Inside the Snowden Breach with Chris Inglis, Former Deputy Director of the NSA

23 Sep 2025

Contributed by Lukas

This episode features Chris Inglis, former U.S. National Cyber Director and longtime Deputy Director of the NSA.With over 40 years in national securit...

The Hidden Dangers of AD CS with Jake Hildreth, Principal Security Consultant at Semperis

09 Sep 2025

Contributed by Lukas

This episode features Jake Hildreth, Principal Security Consultant at Semperis.With nearly 25 years of IT experience, Jake has seen how Active Directo...

When Change Becomes the Biggest Threat with Edward Amoroso, CEO of TAG Infosphere

26 Aug 2025

Contributed by Lukas

This episode features Ed Amoroso, CEO of TAG Infosphere and former AT&T Chief Security Officer.With decades of experience securing complex infrast...

Getting Rid of ADFS featuring Sander Berkouwer

21 Jul 2025

Contributed by Lukas

Sean is joined by identity expert Sander Berkouwer to explore the evolving landscape of enterprise authentication. Active Directory Federation Service...

One Account, $1.4 Billion: Inside the Merck NotPetya Breach with Lance Peterman, CIDPRO

29 May 2025

Contributed by Lukas

The 2017 NotPetya cyberattack remains one of the most devastating and costly breaches in history, inflicting over $1.4 billion in damages on pharmaceu...

CISOs are the Top of the Information Security Food Chain with Allan Allford

21 Apr 2025

Contributed by Lukas

In this time of constant cyber-attacks and increased cybersecurity reporting requirements, a CISO's job is no easy task and typically has a short Tenu...

Where IAM Is Heading with Joe Kaplan

17 Mar 2025

Contributed by Lukas

How is IAM—and the role of the identity security professional—adapting to meet the challenges of today's threat landscape? In this episode of the ...

Microsoft DART: In the Trenches with Shiva P

22 Nov 2024

Contributed by Lukas

Microsoft describes its Detection and Response Team (DART) as the "cybersecurity team we hope you never meet." In this episode of the HIP Podcast, Sea...

Recovering Entra ID Resources and Data with Tuna Gezer

26 Sep 2024

Contributed by Lukas

Following a cyber incident that compromises Entra ID, an inability to recover critical objects and conditional access policies can bring your business...

Lessons Learned from Large-Scale Cyberattacks with HIP Experts

08 Feb 2024

Contributed by Lukas

This week, the HIP Podcast revisits HIP Global 2023! Listen in as our hybrid identity protection experts present lessons learned in the field, helping...

Acing Active Directory Migration with Michael Masciulli

25 Jan 2024

Contributed by Lukas

Anyone who has dealt with the technological side of a merger or consolidation can tell you: Years of technical debt in Active Directory can turn the p...

Outsmarting Cyber Threats in Education with BJ Welsh

27 Oct 2023

Contributed by Lukas

Cyberattacks against K-12 schools have soared, tripling between 2018 and 2021 and continuing to climb. With many school districts balancing legacy tec...

The State of Security with Brian Desmond

31 Aug 2023

Contributed by Lukas

What are in-the-trenches pros observing when it comes to Active Directory and identity security in 2023? Ravenswood Technology Group Principal returns...

Optimizing Cyber Insurance with Jason Rebholz

10 Aug 2023

Contributed by Lukas

“[Attackers] don’t hack in, they log in.” In this episode of the HIP Podcast, Sean talks with Jason Rebholz, Corvus Insurance CISO and host of t...

Tracking Cybercrime with Andy Greenberg

15 Jun 2023

Contributed by Lukas

Tracking Tier 0 Attack Paths with Ran Harel

02 Mar 2023

Contributed by Lukas

Who really has access to your applications and critical infrastructure? You’ve probably heard that identity is the new security perimeter. But how f...

Optimizing Your Security Budget with Jim Doggett

12 Jan 2023

Contributed by Lukas

Budgets are tight in 2023. Where should CISOs focus their spending to best promote cyber and operational resilience? In this episode of the HIP Podcas...

Protecting Critical Infrastructure from Cyberattacks with Jerry Cochran

15 Dec 2022

Contributed by Lukas

What are the biggest cybersecurity threats to critical infrastructure? And just what do we mean when we talk about “critical infrastructure,” anyw...

Cloud Services Access Challenges with Garret Grajek

01 Dec 2022

Contributed by Lukas

The rapid proliferation of cloud services has opened doors to many advancements in the ways we work. Unfortunately, governance of access to those serv...

Planning for a Cyber Crisis with HIP France Panel Experts

17 Nov 2022

Contributed by Lukas

Join hybrid identity protection experts as they discuss the importance of disaster recovery planning to maintain operational resilience. Where should ...

The "Critical Quad" of Security with Alan Sugano

03 Nov 2022

Contributed by Lukas

What keeps Alan Sugano, President of ADS Consulting Group, up at night? Business email compromise (“way more lucrative than a ransomware attack”),...

Updating Disaster Recovery Plans with HIP London Panel Experts

13 Oct 2022

Contributed by Lukas

In this episode, listen in on the expert panel recorded live at HIP London, the first stop on this year's Hybrid Identity Protection Roadshow in June ...

Building a Better Identity Security Posture with Maarten Goet

29 Sep 2022

Contributed by Lukas

Do you have a clear picture of your identity security posture—the good and the not-so-great? In this episode of the HIP Podcast, Sean talks with Maa...

The Real-World State of ITDR with Brian Desmond

08 Sep 2022

Contributed by Lukas

Everyone’s talking about Identity Threat Detection and Response (ITDR) … but what does that mean for people in the IT trenches? In this session, S...

Reckoning with Ransomware as a Service (RaaS) with Alix Weaver

25 Aug 2022

Contributed by Lukas

Recent reports indicate a decrease in ransomware attacks. Should organizations breathe a sigh of relief—or batten down the hatches? In this episode,...

Is Cloud Security an Oxymoron?

11 Aug 2022

Contributed by Lukas

Is cloud security an oxymoron? In this panel session, originally recorded at the inaugural HIP Europe event, Sean Deuby talks with Semperis Chief Tech...

Securing Digital Identities with Julie Smith

21 Jul 2022

Contributed by Lukas

How successful are recent efforts to elevate identity security among enterprises across the United States? IDS Alliance surveyed 500+ security and ide...

Scaling Identity for the Future with Denis Ontiveros Merlo

07 Jul 2022

Contributed by Lukas

Security architectures depend on identity—the “new security boundary.” Yet despite investment in identity and attempts to drive a sustainable id...

What You Should Know About Azure AD Security with Dr. Nestori Syynimaa

23 Jun 2022

Contributed by Lukas

The AADInternals toolkit is a powerful resource for administering and hacking Azure AD. In this episode of the HIP Podcast, Sean talks with Dr. Nestor...

Achieving Operational Resilience with Simon Hodgkinson

03 Jun 2022

Contributed by Lukas

Hopefully, your organization has a disaster recovery plan. But do you have a plan for operational resilience? In this HIP Podcast session, Simon Hodgk...

Solving the Application Security Challenge with Daniel Stefaniak

19 May 2022

Contributed by Lukas

What does flossing your teeth and combatting application security vulnerabilities have in common? We find out in this session of the IP Podcast, featu...

Supporting the Identity Pro Community with Daniel Stefaniak

05 May 2022

Contributed by Lukas

Application security got you down? In this session of the HIP Podcast, Sean Deuby talks with Daniel Stefaniak, Sr Product Manager for IAM, Domino Data...

Prescriptive Identity Security for Healthcare Organizations with Marty Momdjian

21 Apr 2022

Contributed by Lukas

The life-or-death demands of the healthcare industry complicate identity security. The COVID-19 pandemic, increasing popularity of remote care and Int...

So, You’ve Been Breached, What Now? Best Practices for Post-Breach Recovery with Yishai Gerstle

07 Apr 2022

Contributed by Lukas

In today’s world, attacks are inevitable, and breaches are probable. The temptation to return to normal operations as quickly as possible is real, b...

Protecting Active Directory from Attacks: Identity Processes, Trust Settings, and More with Brian Desmond

24 Mar 2022

Contributed by Lukas

What should you tackle first in locking down Active Directory from cyberattacks? In this webinar excerpt, Sean Deuby (Semperis Director of Services) a...

From EDR to XDR to Identity with Paul Lanzi

10 Mar 2022

Contributed by Lukas

Endpoint detection and response (EDR) is quickly evolving into extended detection and response (XDR). That means that identity is moving to the center...

Designating Allowed Applications: Is This the Right Approach to Fighting Ransomware? with Alan Sugano

24 Feb 2022

Contributed by Lukas

Protection from ransomware often starts with preventing unapproved applications from running on systems. However, the ability to restrict which applic...

Defining the Decision-Making Process for Cyberattack Incident Response with Benjamin Cauwel

10 Feb 2022

Contributed by Lukas

When cybercriminals take down your organization, you might have your technical response plan locked and loaded. But who's calling the shots on when to...

Active Directory Disaster Recovery Revisited for 2022 with Guido Grillenmeier and Gil Kirkpatrick

27 Jan 2022

Contributed by Lukas

What has changed about Active Directory disaster recovery since Gil Kirkpatrick and Guido Grillenmeier—aka the "Masters of Disaster"—first wrote t...

Protecting Your Organization from Third-Party Security Risks with Heinrich Smit

13 Jan 2022

Contributed by Lukas

Are your organizations' systems at risk from third-party security breaches? The threat of cyberattacks that enter systems through compromises in third...

Preventing Holiday Cyberattacks with Elad Shamir

16 Dec 2021

Contributed by Lukas

Is your organization ready to defend against a cyberattack that hits over the holidays? Threat actors love to pounce during the holiday season because...

Protecting Privileged Identities and DevOps Pipelines in Microsoft Azure with Thomas Naunheim

02 Dec 2021

Contributed by Lukas

In a cloud environment, securing privileged identities and DevOps pipelines with privileged access requires special attention. In this session, Sean D...

Common Misconceptions About Azure AD Backup and Recovery with Doug Davis

11 Nov 2021

Contributed by Lukas

Shifting to Azure Active Directory means you're done with worrying about backups, right? Not necessarily. As the Azure cloud service provider, Microso...

The Active Directory Connection in Exchange Attacks, Wiper Attacks, and the Kaseya Attacks

28 Oct 2021

Contributed by Lukas

In this excerpt from a web seminar, Sean and Michele Crockett (Semperis Senior Director of Product Marketing) dive into the tight link between Exchang...

The COBOL Challenge: Who Will Maintain Legacy Systems? With Orin Thomas

14 Oct 2021

Contributed by Lukas

As most newly minted technology pros gravitate toward the latest and coolest programming languages and projects, serious questions arise about who wil...

Defending Against PrintNightmare and PetitPotam Vulnerabilities

30 Sep 2021

Contributed by Lukas

In this session excerpted from a web seminar, Sean Deuby (Semperis Director of Services) and Michele Crockett (Semperis Senior Director of Product Mar...

Managing Security in Active Directory vs Azure Active Directory with Doug Davis

16 Sep 2021

Contributed by Lukas

Recent cyberattacks (including the SolarWinds breach) have involved gaining entry into on-premises Active Directory and then moving to Azure Active Di...

Breaking Down Microsoft Security Offerings with Alexander Benoit

02 Sep 2021

Contributed by Lukas

Sean talks with Alexander Benoit, CEO of dinext pi-sec, about how Microsoft security offerings have changed with the company's adoption of the extende...

Emerging Trends in Securing Digital Identities with Julie Smith of IDSA

19 Aug 2021

Contributed by Lukas

How have identity security practices changed in the last year? Semperis Director of Services Sean Deuby chats with Julie Smith, executive director of ...

What to Do Before, During, and After a Cyberattack with Ben Cauwel of Accenture

03 Aug 2021

Contributed by Lukas

What's the worst time to plan for a cyberattack? When you're actively under attack. Sean talks with Ben Cauwel, Senior AD Security Delivery Manager at...

The Future of Identity | LIVE Panel from HIP Europe 2021

22 Jul 2021

Contributed by Lukas

Are passwords really dead? Tune in to this lively conversation among some of the leading luminaries of identity and access management as they debate c...

Is Cloud Security an Oxymoron? | LIVE Panel from HIP Europe 2021

08 Jul 2021

Contributed by Lukas

Is cloud security an oxymoron? In this panel session, featured in the inaugural HIP Europe 2021, moderators Sean Deuby and Guido Grillenmeier discuss ...

Goodbye Passwords: The Future of Identity with John Craddock

24 Jun 2021

Contributed by Lukas

How do we prove who (or what) we are when accessing accounts in the age of multiple cloud services? Passwords are "a nightmare," says John Craddock, l...

Securing Active Directory vs. Securing Azure Active Directory with John Savill

10 Jun 2021

Contributed by Lukas

What's the difference between on-premises Active Directory and Azure Active Directory? Pretty much everything, particularly when it comes to security....

What to Expect at HIP Europe with Guido Grillenmeier

27 May 2021

Contributed by Lukas

Tune in as Sean Deuby is joined by Guido Grillenmeier (Semperis Chief Technologist) to discuss the European debut of the award-winning Hybrid Identity...

The Power of Azure Sentinel with Rod Trent

13 May 2021

Contributed by Lukas

In this episode, Sean is joined by Doug Davis (Semperis Senior Product Manager) and Rod Trent (Microsoft Security Cloud Solution Architect and Global ...

Evolving Security Teams in the Zero Trust Era with CISO Jim Doggett

29 Apr 2021

Contributed by Lukas

The role of the identity team in an organization has evolved over time, becoming a central component of the security infrastructure in the era of Zero...

Battling Hafnium & Microsoft Exchange Exploits with Alan Sugano

15 Apr 2021

Contributed by Lukas

The attacks on Microsoft Exchange Server around the world by Hafnium have affected tens of thousands of organizations. In this session, Semperis Direc...

Identifying Gaps in Your AD Recovery Plan

01 Apr 2021

Contributed by Lukas

Sean is joined by Alexandra Weaver (Semperis Solutions Architect) to discuss Active Directory forest recovery in the context of a comprehensive Busine...

Breaking Down Identity Updates From Microsoft Ignite with Doug Davis

18 Mar 2021

Contributed by Lukas

Are passwords dead? In this session, Sean Deuby and Doug Davis (Semperis, Senior Product Manager) discuss Microsoft's recent announcements at Ignite a...

Securing Your Legacy Apps with Roelf Zomerman

04 Mar 2021

Contributed by Lukas

Sean is joined by Microsoft Cloud Solution Architect, Roelf Zomerman, to discuss the user benefits of having both on-premises + cloud apps i...

Future Proofing Identity Security Panel with Julie Smith, Siddharth Bhai, and Gil Kirkpatrick

11 Feb 2021

Contributed by Lukas

Looking towards tomorrow’s best identity security practices based on the evolving landscape of today, this panel discussion dives into identity acce...

Hacking Identity Panel with Chris Roberts, Wim van den Heijkant, and David Raviv

28 Jan 2021

Contributed by Lukas

Flashback with us to the Hacking Identity panel from the third-annual HIP Conference, as guest host David Raviv (founder of the New York Information S...

Hybrid Identity Security Panel with Brian Desmond, Joe Kaplan, and Jorge de Almeida Pinto

14 Jan 2021

Contributed by Lukas

What does efficient hybrid identity protection look like? Are you under the impression that your organization is too large to go passwordless? In this...

Crisis Management Panel with Jules Okafor, Kat Sweet, and Guido Grillenmeier

23 Dec 2020

Contributed by Lukas

While companies face the advent of widespread ransomware attacks, they must be well prepared with readied crisis management planning. A cybersecurity ...

Exploring the Future of Identity Standards with Pamela Dingle

10 Dec 2020

Contributed by Lukas

Pamela Dingle, Microsoft Director of Identity Standards and founding member of Women in Identity, joins Sean for an overview of why identity standards...

The Origin Story of the HIP Conference | Special HIP 2020 Edition

16 Oct 2020

Contributed by Lukas

Days before the third annual Hybrid Identity Protection conference commences, some of the original figures from the former DEC (Directory Experts Conf...

Becoming Identity-Aware with Identity Defined Security Alliance

24 Sep 2020

Contributed by Lukas

In a recent report from Identity Defined Security Alliance, 79% of enterprises surveyed suffered an identity breach in the past two years. For episode...

Hope Is Not a Strategy: The Security Blueprint for Startups, SMBs, and Beyond

10 Sep 2020

Contributed by Lukas

In this week's episode, we have Dominic Vogel, the Founder & Chief Strategist at CyberSC, walking through the mistakes and cybersecurity misconcep...

The Expert Guide to Azure AD Connect

04 Sep 2020

Contributed by Lukas

In Episode 9, Jorge de Almeida Pinto talks with Sean about all things Azure AD Connect, your link between Active Directory and Azure AD...

Operating in the Age of Zero Trust and Machine Learning

20 Aug 2020

Contributed by Lukas

The rapid shift in priorities among today’s enterprises is leaving security professionals applying these zero trust— “trust no-one, verify every...

Choosing the Right Security Solution, Not the Temporary One

14 Aug 2020

Contributed by Lukas

Nothing is as permanent in IT as a temporary solution. Sander Berkouwer, 11-time Microsoft MVP and CTO of SCCT, joins Sean on the Hybrid Identity Prot...

Weaning Yourself Away From GUI-Based AD Administration

17 Jul 2020

Contributed by Lukas

Continuous learning when it comes to being an AD Admin is a requirement as they’re tasked with adapting to maintain relevancy. Mike Kanakos (Senior ...

Coping With User Demand

30 Jun 2020

Contributed by Lukas

When the forecasting and planning for 2020 couldn’t call for what was in store, Microsoft became tasked with quickly catch up to the demand necessar...

Managing and Securing Cloud-Only Accounts in Your Hybrid Environment

10 Jun 2020

Contributed by Lukas

Today’s guest on The HIP Podcast is Microsoft Cloud Specialist, Allen Brokken. As an expert in leveraging hybrid cloud techniques, Allen shares the ...

Keeping a Security-First Mindset in a "Get It Done Fast" World

21 May 2020

Contributed by Lukas

In times of rapid change, security tends to take a back seat. And good hackers never waste a crisis. So, how are the pros managing remote access secur...

Cover Your SAAS: Getting a Handle on Access and Activity in a Cloud-Focused World

06 May 2020

Contributed by Lukas

With remote workforces accelerating digital transformation, security teams are shifting their mindset from controlling assets to managing access. This...

Provisioning Identities with Security First Frame of Mind in the Hybrid IT Environment

16 Apr 2020

Contributed by Lukas

In this premiere episode of the HIP Podcast, host Sean Deuby is joined by IAM, Senior Security Engineer Lead at Delta Airlines, Andrew Cedergren. Havi...