Register now for Shield Virtual 2021: A Cybersecurity and IAM Online Seminar. Save your spot now >>

Thank you for registering. We've emailed the instructions to join the sessions. We look forward to seeing you.
Mail sent successfully.
Thank you for the referral.
Thank you for registering! We'll get in touch with you shortly.

A Cybersecurity and IAM Online Seminar

Attend our event to stand a chance of winning an Amazon gift card

Closed

We look forward to your participation in our other events.

  • Please enter your name
  • Please enter your email address.
    Please enter a valid email address.
  • Please choose your country
    Please choose your state
  • By clicking 'Register Now', you agree to processing of personal data according to the Privacy Policy.
Register Here

Highlights & Benefits
of this Shield Virtual Seminar

  • Watch presentations from speakers with impeccable credentials.

  • Know the best practices for Active Directory management from across the globe.

  • Learn how to set continuous change monitoring and alerting for your AD environment.

  • Know how to combat sophisticated attacks with advanced log management & security auditing techniques.

  • Learn how to reduce support calls and make your users self-help with password self-service, SSO, and password synchronization.

  • Consult with our experts. Discuss your Active Directory and IT security challenges with them.

First Time at

Shield 2021?

There is a lot to explore
Let us help you navigate the online event.

Agenda

  • ADManager Plus, ADSelfService Plus, ADAudit Plus and EventLog Analyzer
    October 27 | Tuesday
  • 2 PM - 2:45 PM

    Managing AD and Microsoft 365 the hybrid way.

    1. Review and manage inappropriate privileges given to users.
    2. Standardize onboarding, modification and deprovisioning users in AD and Microsoft 365.
    3. Automate routine AD tasks by incorporating a business workflow.
    4. Empower technicians to manage AD and Microsoft 365 without delegating excessive rights.
     
     
  • 2:45 PM - 3:30 PM

    Modern MFA to protect your system, applications and data.

    1. Prevent attacks due to stolen or compromised passwords with 2FA.
    2. Empower users to seamlessly reset passwords with MFA.
    3. Comply with IT best practices for better passwords.
    4. Control access to apps and authenticators based on self-service policies.
     
     
  • 3:30 PM - 4:15 PM

    Strengthening Cyber Security through ML and AI.

    1. Understanding the attack surface - how ML and AI can detect Internal and external attacks.
    2. Importance of Hybrid Active Directory and how ML helps in predicting user behavior.
    3. Get to know when privileged users are under attack and re-mediate an action plan.
    4. Importance of data security and the need for DLP.
     
     
  • 4:15 PM - 5 PM

    Components of an effective SOC: Collection, ingestion, detection and response.

    1. Collection: Bringing in data from across the network.
    2. Ingestion: Transforming data into enriched and actionable information.
    3. Detection: Analyzing possible malicious activity and triaging events.
    4. Response: Managing the aftermath of an incident.
     
     

Presenters

Harish

Technology Evangelist -
ADSolutions, ManageEngine

Sharada

Product Expert -
ADSolutions, ManageEngine

Sujith

Product Expert -
ADSolutions, ManageEngine

Ram

Product Expert -
ADSolutions, ManageEngine

  • ADManager Plus, ADSelfService Plus, ADAudit Plus and EventLog Analyzer
    October 27 | Tuesday
  • 2 PM - 2:45 PM

    Managing AD and Office365 the hybrid way.

    1. Understand and manage inappropriate privileges given to users.
    2. Standardizing the process of onboarding and deprovisioning users in AD and Office365.
    3. Automate routine AD tasks by incorporating a business workflow.
    4. Empower technicians to manage AD and Office365 without delegating excessive rights or access to servers.
     
     
  • 2:45 PM - 3:30 PM

    Modern MFA to protect your system, applications and data.

    1. Prevent attacks due to stolen or compromised passwords with 2FA.
    2. Empower users to seamlessly reset passwords with MFA.
    3. Comply with IT best practices for better passwords.
    4. Control access to apps and authenticators based on self-service policies.
     
     
  • 3:30 PM - 4:15 PM

    Strengthening Cyber Security through ML and AI.

    1. Understanding the attack surface - how ML and AI can detect Internal and external attacks.
    2. Importance of Hybrid Active Directory and how ML helps in predicting user behavior.
    3. Get to know when privileged users are under attack and re-mediate an action plan.
    4. Importance of data security and the need for DLP.
     
     
  • 4:15 PM - 5 PM

    Components of an effective SOC: Collection, ingestion, detection and response.

    1. Collection: Bringing in data from across the network
    2. Ingestion: Transforming data into enriched and actionable information
    3. Detection: Analyzing possible malicious activity and triaging events
    4. Response: Managing the aftermath of an incident
     
     

Presenters

Vivin

Technology Evangelist -
ADSolutions, ManageEngine

Sharada

Product Expert -
ADSolutions, ManageEngine

Harish

Technology Evangelist -
ADSolutions, ManageEngine

Ram

Product Expert -
ADSolutions, ManageEngine

  • ADAudit Plus, EventLog Analyzer

    Day 1

    October 29 | Monday
  • ADManager Plus, ADSelfService Plus

    Day 2

    April 29 | Wednesday
  • 2 PM - 2:45 PM

    Strengthening Cyber Security through ML and AI.

    1. Understanding the attack surface - how ML and AI can detect Internal and external attacks.
    2. Importance of Hybrid Active Directory and how ML helps in predicting user behavior.
    3. Get to know when privileged users are under attack and re-mediate an action plan.
    4. Importance of data security and the need for DLP.
     
     
  • 2:45 PM - 3:30 PM

    Components of an effective SOC: Collection, ingestion, detection and response.

    1. Collection: Bringing in data from across the network
    2. Ingestion: Transforming data into enriched and actionable information
    3. Detection: Analyzing possible malicious activity and triaging events
    4. Response: Managing the aftermath of an incident
     
     

Presenters

Harish

Technology Evangelist -
ADSolutions, ManageEngine

Ram

Product Expert -
ADSolutions, ManageEngine

  • 2 PM - 2:45 PM

    Essentials of Hybrid Active Directory management

    1. Importance of streamlined Identity access
    2. Automating critical AD management routines such as user onboarding, offboarding and group membership management.
    3. Finding out and managing permissions that users have on confidential folders in your organization.
    4. Prevent attacks due to stolen or compromised passwords with 2FA.
    5. Empower users to seamlessly reset passwords with MFA.
    6. Comply with IT best practices for better passwords.
    7. Control access to apps and authenticators based on self-service policies.
     
     
  • Presenters

    Sharada

    Technology Evangelist -
    ADSolutions, ManageEngine

  • ADManager Plus, ADSelfService Plus, ADAudit Plus and EventLog Analyzer
    October 27 | Tuesday
  • 2 PM - 2:45 PM

    Managing AD and Office365 the hybrid way.

    1. Understand and manage inappropriate privileges given to users.
    2. Standardizing the process of onboarding and deprovisioning users in AD and Office365.
    3. Automate routine AD tasks by incorporating a business workflow.
    4. Empower technicians to manage AD and Office365 without delegating excessive rights or access to servers.
     
     
  • 2:45 PM - 3:30 PM

    Modern MFA to protect your system, applications and data.

    1. Prevent attacks due to stolen or compromised passwords with 2FA.
    2. Empower users to seamlessly reset passwords with MFA.
    3. Comply with IT best practices for better passwords.
    4. Control access to apps and authenticators based on self-service policies.
     
     
  • 3:30 PM - 4:15 PM

    6 Active Directory security events that have hit the mainstream in 2020

    1. Understanding the attack surface - how ML and AI can detect internal and external attacks.
    2. Importance of Hybrid Active Directory and how ML helps in predicting user behavior.
    3. Get to know when privileged users are under attack and re-mediate an action plan.
    4. Importance of data security and the need for DLP.
     
     
  • 4:15 PM - 5 PM

    Components of an effective SOC: Collection, ingestion, detection and response.

    1. Collection: Bringing in data from across the network.
    2. Ingestion: Transforming data into enriched and actionable information.
    3. Detection: Analyzing possible malicious activity and triaging events.
    4. Response: Managing the aftermath of an incident.
     
     

Presenters

Vivin

Technology Evangelist -
ADSolutions, ManageEngine

Megha

Product Expert -
ADSolutions, ManageEngine

Sharada

Product Expert -
ADSolutions, ManageEngine

Ram

Product Expert -
ADSolutions, ManageEngine

Register Now

Other Events

View all events

ManageEngine

A division of Corporation

4141 Hacienda Drive, Pleasanton, California 94588, USA

© 2021 Zoho Corporation Pvt. Ltd. All rights reserved.