Securing Active Directory Certificate Services with Ron Arestia
You're using Active Directory Certificate Services - but is it configured securely? Richard talks to Ron Arestia about his work with organizations implementing their own Public Key Infrastructure (PKI) with ADCS. Ron explains how poorly configured ADCS enables lateral attacks within an organization once an initial breach occurs, allowing black hats to move throughout your network. A well-designed PKI system has tiers of protection, with the top level completely disconnected from the network. Or do you really need your own PKI system? The conversation digs into the various scenarios, including third-party options. Certificates are the top level of security for your organization - you need to get it right!
Episode 1023 of the RunAs Radio podcast, hosted by Ron Arestia, Richard Campbell, titled "Securing Active Directory Certificate Services with Ron Arestia" was published on February 11, 2026 and runs 44 minutes.
February 11, 2026 ·44m · RunAs Radio
Summary
You're using Active Directory Certificate Services - but is it configured securely? Richard talks to Ron Arestia about his work with organizations implementing their own Public Key Infrastructure (PKI) with ADCS. Ron explains how poorly configured ADCS enables lateral attacks within an organization once an initial breach occurs, allowing black hats to move throughout your network. A well-designed PKI system has tiers of protection, with the top level completely disconnected from the network. Or do you really need your own PKI system? The conversation digs into the various scenarios, including third-party options. Certificates are the top level of security for your organization - you need to get it right!
Episode Description
You're using Active Directory Certificate Services - but is it configured securely? Richard talks to Ron Arestia about his work with organizations implementing their own Public Key Infrastructure (PKI) with ADCS. Ron explains how poorly configured ADCS enables lateral attacks within an organization once an initial breach occurs, allowing black hats to move throughout your network. A well-designed PKI system has tiers of protection, with the top level completely disconnected from the network. Or do you really need your own PKI system? The conversation digs into the various scenarios, including third-party options. Certificates are the top level of security for your organization - you need to get it right!
Links
- Active Directory Certificate Services
- Windows Hello for Business
- Certified Pre-Owned
- Microsoft Defender for Identity
- Secure Privileged Access
- Pass the Hash
- Microsoft Cloud PKI for Microsoft Intune
- Microsoft Entra Conditional Access
- Microsoft Autopilot
- Ron's Blog
Recorded February 6, 2026
Similar Episodes
Apr 9, 2026 ·101m
Apr 8, 2026 ·21m
Apr 7, 2026 ·52m
Mar 27, 2026 ·80m