Protecting Hybrid Active Directory Environments from Cyber-Attacks

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The inherent security weaknesses of on-premises Active Directory (AD) have been well documented, but the risk profile has increased further as a result of the shift to hybrid working environments that use both AD and Azure Active Directory. This has expanded the attack surface for adversaries, and recent incidents, including the SolarWinds breach, are evidence that cyber-criminals are actively targeting hybrid identity security gaps.

Although many organizations have strategic plans to move services and assets to the cloud, the reality is that most will be operating in a hybrid identity scenario for the foreseeable future. Amid this landscape, organizations must enhance their AD and Azure AD defenses. In this session, a panel of security experts will outline the top security risks to watch for in a hybrid AD environment and offer guidance and expertise on how organizations can harden their hybrid AD security defenses.

Attendees will learn:

  • The Azure AD authentication model and how it differs from on-premises AD authentication
  • Changing definition of the “perimeter” in Azure Active Directory
  • The radical shift in the permission model—with a real-world example of delegated application permissions and how misconfigurations can open the door to cyber-attacks


Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Guido Grillenmeier

Guido Grillenmeier

Chief Technologist, Semperis

Photo of Harman Singh

Harman Singh

Security Expert and Consultant

Photo of Peter Wood

Peter Wood

Partner, Naturally Cyber LLP

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Semperis here: Please see Infosecurity Magazine’s privacy policy for more information.