Powered by RND
PodcastsTechnologyGuardians of the Directory
Listen to Guardians of the Directory in the App
Listen to Guardians of the Directory in the App
(524)(250,057)
Save favourites
Alarm
Sleep timer

Guardians of the Directory

Podcast Guardians of the Directory
Craig Birch
Guardians of the Directory is the podcast for everything Active Directory security, management, and recovery. Join us as we dive into best practices, recent sec...
More

Available Episodes

3 of 3
  • Active Directory Recovery Post Ransomware
    In this episode of Guardians of the Directory, Craig Birch and Chad Nichols discuss the critical steps needed to recover from a ransomware attack that targets Active Directory. They explore the challenges organizations face during such attacks, the importance of having a solid recovery strategy, and the lessons learned from real-world experiences. The conversation emphasizes the need for preparedness, security measures during recovery, and the implementation of best practices to prevent future attacks. takeaways Active Directory is the backbone of the network. Ransomware attacks can encrypt all systems quickly. Assessing damage post-attack is crucial. Recovery strategies must be well-planned. Traditional backup solutions may not suffice. Isolating infected systems is essential during recovery. New accounts should be created for privileged users post-recovery. Implementing zero trust security policies is vital. Regular testing of recovery procedures is necessary. Learning from past experiences can improve future responses.
    --------  
    35:58
  • Trailer: Guardians of the Directory: Defending the Backbone of Enterprise Security
    In this inaugural episode of Guardians of the Directory, join Craig Birch, Principal Security Engineer and Technical Evangelist at Cayosoft, as he introduces himself and the mission of this podcast dedicated to Active Directory (AD) and Entra ID management, security, and recovery. With over two decades of experience in identity security and a passion for helping AD administrators and security professionals alike, Craig dives into the critical role AD and Entra ID play in today’s enterprise environments. Why focus on a technology that’s been around for 24 years? AD and Entra ID remain at the core of over 90% of organizations worldwide, often becoming prime targets for cyber attackers who seek privilege escalation paths. Each episode, Craig will share actionable insights, best practices, and expert interviews on topics ranging from AD basics to advanced defense strategies. Whether you're an AD admin, security expert, or curious learner, tune in bi-weekly for updates on key challenges and emerging solutions. Subscribe to Guardians of the Directory wherever you get your podcasts and stay one step ahead in protecting your organization’s backbone. Stay guarded, stay informed—be the Guardian of your directory!
    --------  
    2:03
  • Beyond Defense: Why Traditional Defenses against Ransomware Fail
    Summary In this episode of Guardians of the Directory, Craig Birch and Mike Brennan discuss the evolving landscape of cybersecurity, particularly focusing on identity security and the challenges organizations face in preventing ransomware attacks. They explore the inadequacies of traditional security measures, the importance of proactive strategies, and the need for continuous monitoring and modern recovery solutions. The conversation emphasizes the necessity for organizations to rethink their security approaches to effectively combat the growing threat of ransomware. Takeaways Organizations are still struggling with stopping ransomware attacks despite having security solutions in place. Ransomware is evolving, and traditional defenses are often inadequate. Endpoint protection is challenging due to the proliferation of devices and remote work. Vulnerability management is hindered by inconsistent patching and the speed of zero-day exploits. Privileged Access Management (PAM) is crucial but often overlooked in identifying all privileged accounts. Multi-Factor Authentication (MFA) is not a silver bullet and has its limitations. SIEM systems can be overwhelmed by alerts and may not detect sophisticated attacks. Pen testing provides valuable insights but should be complemented with continuous monitoring. Backup and recovery strategies need to be proactive and air-gapped to prevent reinfection. Organizations must adopt a holistic approach to security, focusing on identity and access management. Chapters 00:00 Introduction to Identity Security and Ransomware Threats 03:02 The Evolution of Cybersecurity Defenses 06:04 Endpoint Protection Challenges 08:59 Vulnerability Management and Patching Issues 11:57 The Importance of Privileged Access Management 14:56 Understanding Multi-Factor Authentication Limitations 18:13 The Role of SIEM in Modern Security 22:03 Pen Testing and Continuous Monitoring 27:06 Backup and Recovery Strategies 36:03 Conclusion: Rethinking Security Approaches
    --------  
    38:54

More Technology podcasts

About Guardians of the Directory

Listen to Guardians of the Directory, Terms of Service with Clare Duffy and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Radio
Social
v6.30.1 | © 2007-2024 radio.de GmbH
Generated: 12/8/2024 - 6:22:06 PM