\ ManageEngine's IT Security Seminar - New Zealand 2018
Thank you for registering! We'll get in touch with you shortly.
Mail sent successfully.
Thank you for the referral.

IT Security Seminar

New Zealand

WellingtonTe Papa Museum
ChristchurchTait Technology Centre
AucklandWaipuna Hotel & Conference Centre

Due to unforeseen circumstances, we've postponed the seminars to February. The dates will be updated soon.

Highlights & Benefits of this Seminar

  • Watch presentations from speakers with impeccable credentials.

  • Presentations that will help you tackle your various IT Security challenges head-on.

  • Know how to configure and monitor the critical security settings of your AD environment.

  • Learn how to combat various security threats with effective log management techniques.

  • Consult with our experts. Discuss your IT security and Active Directory challenges with them.

ManageEngine's ADSolutions solves the IAM and IT Security Challenges faced in Windows environment

Know Your Presenters


Technical Evangelist - ADSolutions, ManageEngine

Harish Sekar is a Technical Evangelist for ADSolutions team at ManageEngine, a division of Zoho Corp. He is a regular speaker in international conferences and seminars on how to leverage technology better by using ManageEngine tools. He specializes in guiding admins across the globe to solve day to day problems of managing and monitoring in Active Directory, Office 365, and Exchange environments.


IT Security and Compliance Specialist

Siddharth Sharath Kumar is an IT security and compliance specialist on ManageEngine's product marketing team. He writes articles and e-books, regularly hosts webinars on key IT security topics, and presents at ManageEngine's conferences and other industry events across the globe.


  • 09:00 - 09:15

    Registration and Refreshments

  • 09:15 - 10:00

    Active Directory: the most used service is also the least monitored

    Active Directory (AD), in simple terms, determines what each user can do in the network. Though everything around it is permission oriented, it is very difficult to gain visibility into the permissions that a user has. This leaves AD, one of the most used services, the least monitored of all critical services. This session will dwell into aspects that can simplify AD monitoring for you.

    Topics of discussion:
    • Negate the most common internal attacks by:
      • Tracking user authentication and authorization across platforms.
      • Monitoring failed login attempts of high-privileged users.
      • Detecting privilege escalation (through group membership changes) and tracing even local administrator group changes.
    • Know why service accounts are no longer the necessary evils of your enterprise.
    • Learn about stale accounts and the need to watch over them.
  • 10:00 - 10:45

    Weak passwords could put users' accounts in your organization-on sale

    Password security is often overlooked, eventually leading to a breach due to weak passwords. The password policy settings in Active Directory are limited and fail to increase security, thereby demanding robust password policy settings.

    Topics of discussion:
    • Breaking the complexity around passwords.
    • Enforcing advanced password policy settings such as dictionary rule and pattern check in Active Directory to eliminate weak passwords.
    • Add an extra layer of security to user accounts by enabling two-factor authentication for Windows logons.
    • The need for centralized, granular password policies across Active Directory and cloud applications.
    • How to enhance user experience and reduce help desk tickets by enabling single sign-on (SSO).
  • 10:45 - 11:00


  • 11:00 - 11:45

    IT risk assessment: Poor data governance leaves you vulnerable to breaches.

    Data growth is exponential in today's world. More than half of that data that your organization stores falls under the unstructured category, existing outside of databases and within files, multimedia content and other formats. It's important for you to detect the presence of these data and track every activity happening on the device that stores the data to avoid any kind of breaches.

    Topics of discussion:
    • Data classification: The importance and need.
    • Security safeguards: How to track the access and movement of sensitive files in your data storage devices.
    • How to prevent files being tampered with, or deleted, deliberately or accidentally.
    • War against ransomware: How ready are you?
  • 11:45 - 12:30

    Your logs are talking. Are you listening?

    Logs contain valuable information about important security events occurring in your network. You must monitor your logs to stay on top of threats and to detect attacks happening within your premises.

    Topics of discussion:
    • Latest trends in Security Information and Event Management (SIEM).
    • Reviewing security events with regular audit reports.
    • Setting up alerts to detect potential threats.
    • Event correlation and use cases.
    • User Behavior Analytics (UBA).
    • Streamlining incident response with the rest of your IT.
  • 12:30 - 1:30

    Lunch & Networking

  • 1:30 – 2:15

    Panel Discussion

  • 2:15

    Wrap up

Venue Details

Museum of New Zealand Te Papa Tongarewa

Wellington, New Zealand

Tait Technology Centre

Christchurch, New Zealand

Waipuna Hotel and Conference Centre

Auckland, New Zealand


A division of Corporation

4141 Hacienda Drive, Pleasanton, California 94588, USA

Soft Solutions

Soft Solutions Ltd, PO Box 26370, Epsom,
Auckland 1344, New Zealand.

© 2018 Zoho Corporation Pvt. Ltd. All rights reserved.