Thank you for registering! We'll get in touch with you shortly.
Mail sent successfully.
Thank you for the referral.

Active Directory & IT Security Seminar

South Africa

JohannesburgPremier Hotel Midrand
Cape TownRadisson Blu Waterfront


Highlights & Benefits of this Seminar

  • A knowledgeable presenter: Derek Melber has 15 years of Active Directory training experience

  • Learn about the next-gen Active Directory management trends and techniques

  • Know how to configure and monitor the critical security setting of your AD environment

  • Learn how to combat various security threats with effective log management techniques

  • Consult with our AD experts. Discuss your Active Directory challenges with them

ManageEngine ADSolutions solves the IAM and IT Security Challenges faced in Windows environment

Know Your Presenters

Derek Melber

Technical Evangelist - ADSolutions, ManageEngine

As an Active Directory MVP, he is sought after globally for his knowledge, insight, and keen understanding of the Windows product line, especially Active Directory. Derek has extensive experience in offering solutions to Active Directory change monitoring challenges. He writes for, speaks to, and educates thousands of IT professionals around the world, every year through his blogs, books, seminars, webinars, etc.


Presales Consultant - ADSolutions, ManageEngine

Harish Sekar is a presales consultant for ADSolutions team at ManageEngine, a division of Zoho Corp. He is a regular speaker in international conferences and seminars on how to leverage technology better by using ManageEngine tools. He specializes in guiding admins across the globe to solve day to day problems of managing and monitoring in Active Directory, Office 365, and Exchange environments.

Nerushka Bowan

POPI Expert

Nerushka is an emerging technology law specialist, legal technology innovator and speaker. She is a co-chair of the Johannesburg chapter of the International Association of Privacy Professionals (the largest association of privacy professionals in the world).She has a background as a technology & privacy lawyer for an international law firm and has worked on data privacy matters for both local and international clients


  • 08:30

    Registration and Refreshments

  • 09:00 - 09:15

    Welcome Note

  • 09:15 - 10:00

    Final Preparations for the GDPR

    • How to best design and manage users, groups, and organizational units in Active Directory
    • Suggestions on file, database, and folder design strategies
    • Deep dive into access control list design and strategies
    • How to set up auditing to track all object changes and resource access
    • Solutions for breach detection and reporting
  • 10:00 - 10:45

    Leveraging SIEM Advanced Technologies

    • The limitations that Microsoft Event Viewer possesses
    • Powerful use cases that can help you manage security and access better
    • Customization concepts that will allow you to tailor your SIEM solution for your environment
    • How to leverage correlation to detect anomalies and attacks better
  • 10:45 - 11:00


  • 11:00 - 11:45


    • Overview of Data Privacy law in South Africa
    • Status of the POPI Act
    • Breakdown of POPI
      • Similarities and differences between POPI and GDPR
    • Expert tips on Compliance
  • 11:45 - 12:30

    Negating the most common internal attacks

    • How to reduce and eliminate attacks against Microsoft authentication protocols
    • Why it is essential to protect your network against common communication protocol attacks
    • What it takes to reduce the attacks against password hashes and tickets
    • How to reduce and monitor privilege escalation attack
  • 12:30 - 1:30


  • 1:30 - 2:15

    Tips for structuring your Active Directory and Office 365 infrastructure

    • Trace users accessing the right resources at the right time
    • How to track authentication, report and audit activities across platforms
    • Ways you can work access request through workflow and why you should audit them
  • 2:15 - 3:00

    How to improve your data storage security and build a backup plan

    • How to track the access and movement of sensitive files
    • How to mitigate the risk of files being deleted or tampered with
    • War against Ransomware -how ready are you?
    • Practical methods to magnify any misuse activities on your file server
    • Do you have a backup plan? to recover and restore deleted/tampered/encrypted files?
  • 3:00 - 3:30


Venue Details

Premier Hotel Midrand

Johannesburg, South Africa

Radisson Blu Hotel Waterfront

Cape Town, South Africa


A division of Corporation

4141 Hacienda Drive, Pleasanton, California 94588, USA

ITR Technology

13 Esdoring Nook, Central Park, Building 10 FF
Highveld Techno Park, Centurion

© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.