8:45am - 9:30am
Registration and refreshments
Collect your ID cards from the registration table and join us for a hot cup of coffee!
9:30am - 9:45am
Introduction and Key Note
9:45am - 10:30am
IT Service Managementslidedownslideup
- Listen to real-time use cases in Service Management that involves applying the right balance of People, Tools and Processes.
- Overcome complex challenges in Incident, Asset and Change Management through ITSM Best Practices.
- The nuances of Request Fulfillment, Major Incident Management and Change Workflows.
- How IT Asset Management complements ITSM for enhanced service delivery.
10:30am - 10:45am
10:45am - 12:00am
Essential toolkit for effective Active Directory Managementslidedownslideup
Self-Service Password Management
- User Onboarding and Offboarding for Active Directory & Office 365
- Automating critical tasks -- Inactive users cleanup, group membership management
- Reporting and managing permissions on server shares & confidential folders
- Building a better help desk with AD delegation, business workflow and integrations.
- Reducing help desk calls for password resets and account unlocks with self-service and by enforcing smarter password policies.
- Strike the right balance between ease of access and password security with MFA.
- Provide one-click access to cloud applications with Active Directory-based single sign-on.
1:00pm - 1:45pm
- How analytics can help produce better business decisions.
- Collecting and analyzing data from different business applications.
- Identifying patterns and gathering key insights from your IT data.
1:45pm - 2:00pm
- Securing against Vulnerabilities/Malware with effective Patch Management.
- Automating Desktop Management routines like Software Deployment, OS Deployment, etc.
- Performing Remote Management Tasks with ease.
- Secure, Configure, and Enforce Policies on Mobile Devices
2:00pm - 2:45pm
IT Operations Managementslidedownslideup
- The drawbacks of managing IT using multiple tools.
- Investigating the root cause of poor network performance and preventing downtime.
- Simplifying data center management with integrated network monitoring.
2:45pm - 3:00pm
3:00pm - 3:30pm
IT Security : Privileged Identity Managementslidedownslideup
- Preventing insider threats by controlling access to privileged accounts.
- Implementing privileged account management best practices in your company.
- Staying on top of regulatory and compliance requirements for privileged access.
3:30pm - 4:30pm
IT Security : Decrypting the security mystery with SIEMslidedownslideup
4:30pm - 5:00pm
Q & A / Wrap Up