First Time at
Shield 2023?
There is a lot to explore and Live - let us help you navigate the conference.
Highlights &
Benefits of this Convention
- Watch presentations from speakers with impeccable credentials.
- Learn how to set-up continuous change monitoring and alerting for your AD environment.
- Learn how to improve employee productivity and reduce help desk costs with password self-service, SSO, and password sync.
- Know the best practices for Active Directory management from across the globe.
- Know how to combat sophisticated attacks with advanced log management & security auditing techniques.
- Consult with our experts. Discuss your Active Directory and IT security challenges with them.
Know Your Presenters
-
Harish
Senior Technical Evangelist
Harish Sekar is a senior technology evangelist for the ADSolutions team at ManageEngine, a division of Zoho Corporation. He is regularly seen presenting at international conferences and seminars on how to leverage technology better. He specializes in guiding IT administrators and security professionals across the globe on how to administer their hybrid Active Directory better and strengthen their organizations' security.
-
Koushik
Cybersecurity Expert
Koushik is a Cybersecurity expert at ManageEngine. He's passionate about speaking with network administrators, understanding their environments and delivering tailor made solutions for cybersecurity and providing solution recommendations. Koushik specializes in understanding constantly evolving threat models and dishing out zero trust implementations and factoring AI and MI into custom cybersecurity solutions.
Agenda
08:00 - 9:00 AM
Registration
09:00 - 10:30 AM
The Basics of Zero Trust: Essential Steps to Implementation
Part 1: Automate, Delegate, Manage, and Recover (09:00 - 09:45 AM)
- Eliminating redundancy and human errors, and enhancing business processes through automation
- Delegating tasks to technicians instead of server/admin portal access
- 5 things to do immediately if you suspect an account has been compromised
- One click recovery from accidental Active Directory and M365 changes
Part 2: Strengthening the human element in the equation (09:45 - 10:30 AM)
- Enforcing centralized granular password policies across Active Directory and cloud applications.
- Applying adaptive MFA to elevate trust in identities and mitigate user impersonation
10:30 - 10:45 AM
Coffee Break
10:45 - 12:15 PM
Cybersecurity weak spots to address before adopting Zero Trust approach
Part 1: Addressing vital W's (who,what,when and where) of IT Security (10:45 - 11:30 AM)
- ITSecurity Identifying security misconfigurations that can lead to breaches
- A comprehensive security strategy to safeguard domain admin accounts from misuse.
- Azure Security-what's missing?
- Data security, the importance of data protection and user behavior prediction
Part 2: Cyberattacks are expensive: A SIEM solution shouldn't be (11:30 AM - 12:15 PM)
- Why SIEM? What to expect from one?
- Customizing reports, attack detection and remediation mechanisms to
- Importance of integrating SIEM with threat feeds and ticketing ITSM tools.
- Cyber resilience and how Zero trust can help
12:15 - 1:30 PM
Lunch
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
- Eliminating redundancy and human errors, and enhancing business processes through automation
- Delegating tasks to technicians instead of server/admin portal access
- 5 things to do immediately if you suspect an account has been compromised
- One click recovery from accidental Active Directory and M365 changes
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA