First Time at
There is a lot to explore and Live - let us help you navigate the conference.
Benefits of this Convention
Learn to orchestrate and automate user life cycle management across applications
Know how MFA-powered SSO can help seamlessly access cloud apps while ensuring
Discover how to implement Zero Trust using role-based access control and prevent
Step up your security by learning to adopt proactive security with risk posture
Walk in the path of the attackers to neutralise their techniques and boost up your
Learn to get visibility into your hybrid or muti-cloud environment and be compliant
with regulatory mandates.
08:00 - 9:00 AM
Registration and Breakfast
09:00 - 10:30 AM
The Basics of Zero Trust: Essential Steps to Implementation
- Eliminating redundancy and human errors, and enhancing business processes through automation
- Delegating tasks to technicians instead of server/admin portal access
- Enforcing centralized granular password policies across Active Directory and cloud applications.
- Applying adaptive MFA to elevate trust in identities and mitigate user impersonation
10:30 - 10:45 AM
10:45 - 12:15 PM
Address your cyber risk! Deploy a security analytics solution
- Taking a risk-based approach to cybersecurity.
- Some popular attacks: SMB relay, LLMNR poisoning, Denial of service, Password Spray.
- Domain enumerationDetection with Log360.
- Using anomaly detection to decrease false positives.
- Hardening your data security.
12:15 - 1:30 PM