̽»¨ÊÓÆµ

̽»¨ÊÓÆµ, in conjunction with its vendor partners, sponsors hundreds of events each year, ranging from webcasts and tradeshows to executive roundtables and technology forums.

Events and Resources

Events

Cayosoft-Microsite-Logo.png
Cayosoft

Hybrid Identity Security & Recovery Crash Course


Event Date: July 17, 2025
Hosted By: Cayosoft & ̽»¨ÊÓÆµ

In today's hybrid IT environments, Active Directory (AD) and Entra ID remain the foundation of access and security but are also a primary target for modern identity-based attacks. Additionally, aligning your recovery capabilities with attacker behavior is crucial to restore trust, permission, roles, and control.

Watch the on-demand webinar featuring Cayosoft's Tech Evangelist Craig Birch, where you will gain the tools to combine attack-path clarity with recovery-first strategies to make your hybrid identity environment more resilient, audit-ready, and breach-resistant.

Specifically, you will learn how to:

  • Spot and remediate critical AD and Entra ID misconfigurations that open the door to privilege escalation
  • Uncover hidden hybrid attack paths, including delegation abuse, SIDHistory chaining, and federation hijacks
  • Recognize modern attack methods that destroy identity infrastructure and tools to mitigate the attacks
  • Recover privileged groups, GPOs, Entra roles, and domain trust instantly post-attack
  • Build a practical, recovery-ready approach to AD security that works across every stage

Fill out the form below to view this archived event.


Resources


Smaller Jurisdictions Get Big Protection with Endpoint Detection and Response
Resources

Smaller Jurisdictions Get Big Protection with Endpoint Detection and Response

Smaller counties, municipalities and tribal governments have ex­perienced massive upheaval in the past few years. To maintain continuity of services during the disruptions of the pandemic, they’ve had to quickly enable workers and community members to access data, systems and workflow processes from any device, location, and network — and they’ve done so with limited IT staff and funding.


Fill out the form below to view this Resource.