How to Recover Active Directory When Every Second Counts

Date: Monday, December 9th at 9am PT / 12pm ET

Microsoft Active Directory (AD) is a key target for cyberattackers. When AD goes down, so do your operations. Yet most organizations lack an AD-specific recovery plan or rely on manual recovery, which can take days if not weeks.

Auditing your AD security stance and maintaining a solid incident response plan are vital protective steps. But AD recovery should also be a priority of any identity threat detection and response (ITDR) strategy. Sean Deuby,Principal Technologist, Semperis to discover how threat actors breach hybrid AD environments, how you can reduce the risk, and why hybrid AD recovery planning is vital to operational resilience. You’ll learn:

  • How to detect vulnerabilities in hybrid AD environments
  • How to reduce the risk of a breach that targets AD
  • How to ensure, a fast, clean AD forest recovery post-attack
  • Points to consider when developing an AD incident response or recovery plan

Register now!

About the presenters:

Sean Deuby - Principal Technologist, North America; Microsoft MVP alumnus, Semperis

Sean Deuby brings more than 30 years’ experience in enterprise IT and hybrid identity security to his role as Semperis' Principal Technologist, North America. An original architect and technical leader of Intel's Active Directory, Texas Instrument’s Windows NT network, and 15-time MVP alumnus, Sean has been involved with Microsoft identity technology since its inception. His experience as an identity strategy consultant for many Fortune 500 companies gives him a broad perspective on the challenges of today's identity-centered security. Sean is also an industry journalism veteran; as a former technical director for Windows IT Pro, he has over 400 published articles on Active Directory, Azure Active Directory, hybrid identity, and Windows Server.

Duration: 1 hour


Your e-mail address is used to communicate with you about your registration, related products and services, and offers from select vendors. Refer to our Privacy Policy for additional information.