Thank you for registering! We'll get in touch with you shortly.

An IAM and Cybersecurity Convention

united kingdom

  • Mar 17

    Will update soon

    Will update soon


The seminar is postponed to a later date. We will keep you updated on the revised date.

Register Here


A look back

  • 30+


  • 50+


  • 60+


  • 10000+


  • 10+

    Domain Experts

First Time at

Shield 2020?

There is a lot to explore and
Live - let us help you navigate the conference.

Highlights & Benefits
of this Convention

  • Watch presentations from speakers with impeccable credentials.

  • Know the best practices for Active Directory management from across the globe.

  • Learn how to set-up continuous change monitoring and alerting for your AD environment.

  • Know how to combat sophisticated attacks with advanced log management & security auditing techniques.

  • Learn how to improve employee productivity and reduce help desk costs with password self-service, SSO, and password sync.

  • Consult with our experts. Discuss your Active Directory and IT security challenges with them.

Know Your Presenters

  • Vivin

    Technical Evangelist,



Technical Evangelist, ManageEngine

Vivin is a Technical Evangelist for ADSolutions team at ManageEngine, a division of Zoho Corporation Pvt. Ltd. He presents POCs, and takes care of implementation as well as product training for ADSolutions customers across the globe. He is also a regular speaker on the latest trends and best practices in Windows infrastructure management, in international seminars and user conferences conducted by ManageEngine.



Technical Evangelist, ManageEngine

Harish Sekar is a Technical Evangelist for ADSolutions team at ManageEngine, a division of Zoho Corporation Pvt. Ltd. He is a regular speaker in international conferences and seminars on how to leverage technology better by using ManageEngine tools. He specializes in guiding admins across the globe to solve day to day problems of managing and monitoring in Active Directory, Office 365, and Exchange environments.


  • 08:30 - 09:15


  • 09:15 - 10:00

    Exposing attackers using AI and UBA

      Most attacks exhibit one or more common factors. Being able to detect when one of these common factors is triggered could allow for action to be taken against the attack. AI can help analyze user activity so that anomalous activity can be caught and reported. When the security professional injects logic to the reported activity, clear signs of malicious behavior can be seen and stopped. In this session, Derek Melber will show you how AI results, combined with logic, can help your organization detect malicious behavior and stop it before a breach occurs. In this session, you will learn:

    1. How AI analyzes data to find anomalies
    2. Which behaviors you should be focusing on
    3. What levels of common activity is normal and what is an anomaly
    4. How logic and AI combined can detect attacks
  • 10:00 - 10:45

    Increasing password security and incorporating MFA

      Passwords have proven to be a problem for nearly everyone involved. End users can’t remember even the simplest of passwords, not to mention passwords have proven to be hacked quite easily. Microsoft internally is doing away with passwords and the industry is moving to MFA to also remove the reliance on passwords. In this session, MVP Derek Melber will show you why passwords are weak, discuss where passwords can be enhanced without MFA, then show you how MFA can be used in many areas to increase identity management security. In this session, you will learn:

    1. The true state of our passwords and where they are weak
    2. How attackers break into passwords and hashes
    3. What can be done to increase password security
    4. Where MFA can be used to increase identify management security
  • 10:45 - 11:00

    Coffee Break

  • 11:00 - 11:45

    Securing a hybrid Active Directory environment

      Having a hybrid Active Directory environment means that there are now two twice as much that needs to be secured. Everything from authentication, resource access, policies, and monitoring are doubled due to you having Active Directory on-prem and in Azure. Knowing what security settings should be, as well as when these security settings change is essential for you to eliminate unwanted access and stop potential attacks. In this session Derek Melber will walk you through some of the key areas in your hybrid Active Directory environment that you must secure. In this session, you will learn:

    1. Which groups you need to monitor
    2. What you can do to protect your ability to administer Azure AD
    3. How you can monitor changes to roles and privileges
    4. What is ideal for authentication and password security
  • 11:45 - 12:30

    Simplifying SIEM

    1. Why enterprises must focus on incident detection and response
    2. Implementing a robust log management system
    3. Best practices for reporting and alerting
    4. Crucial security events you need to track in your network
    5. Combating advanced threats by leveraging correlation rules
  • 12:30 - 1:30


  • 1:30 - 2:00


Venue details


A division of Corporation

4141 Hacienda Drive, Pleasanton, California 94588, USA

10 Infinity Sdn Bhd (1132306-k)

A-5-10, Empire tower, ss16/1,
subang jaya, 47500 Selangor.

© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.

Frequently asked questions

Q. What is ManageEngine's Shield 2020 - An IAM and Cybersecurity Convention?

ManageEngine's Shield 2020 is an IAM and Cybersecurity Convention hosted by ManageEngine. The focus of this one day event is to educate IT administrators about the latest developments and best practices in AD and IT security management, monitoring, and auditing and how our solutions will help them achieve their IT goals.

Q. Why should I attend the convention?

  • A chance to gain in-depth knowledge from experts with impeccable credentials.
  • Stay on top of next-gen Active Directory & IT security trends and techniques.
  • Participate in one-on-one discussions with our product experts that will empower you to overcome your Active Directory & IT security challenges.
  • Stay ahead of the curve by picking up valuable tips and tricks from our experts.
  • Take part in live product demos to understand our solutions like never before.
  • Last but not least, make use of this unique opportunity to network with your peers.

Q. What time should I be present at the event venue?

Our event kicks off at 9:00 AM. The registration desk opens at 8:00 AM. We would recommend you to arrive early, as it will enable you to network with peers.

Q. When does the event end?

The event gets over at 2:00 PM.

Q. Where will this event take place?



Q. Do I need to bring my laptop to the session?

A laptop is not required for the convention, however, you can bring it to take notes if you wish.

Q. How do I register for the event?

Register now

Q. When should I register for the convention?

Since there are limited seats available, we would advise you to register right away.

Q. I've registered for the convention but will not be able to attend. Can I transfer my pass to a colleague or friend?

Yes, certainly. We would advise you to get in touch with us by sending a mail with the Name and Email ID of your colleague or friend. We will process the request immediately and send you a confirmation.