Register Now
Register Now

The Enterprise Security Workshop IAM and SIEM in action

Ireland   

  • Dublin

    Royal Marine Hotel, Dublin

    26 June, 2025

Register for the Workshop

Thank you for your interest, but we regret to inform you that registrations are now closed.

  •  
  •  
  •  
  •  
  • By clicking 'Claim your spot now' you agree to processing of personal data according to the Privacy Policy.
    Play Now

A lookback at our
Shield workshop

30

Countries

10000

Participants

50

Cities

60

Seminars

10

Domain Experts

40

Speakers

   

Highlights &
Benefits of this Workshop

  • Streamline Identity Lifecycle Operations Automate provisioning, deprovisioning, and role changes across hybrid environments using policy-driven workflows.
  • Enforce Role-Based and Approval-Based Access Controls Implement secure delegation, role management, and multi-level access request approvals to enforce least privilege.
  • Run Audit-Ready Access Certifications Launch periodic access reviews and identity risk assessments to meet compliance mandates like DORA, NIS2, and ISO 27001.
  • Aggregate Logs Across AD, Cloud & Applications Centralize security log collection from diverse sources and correlate events for deeper threat visibility.
  • Track and Audit AD Changes in Real Time Monitor and alert on critical changes to users, groups, GPOs, and OU structures to prevent privilege abuse or misconfigurations.
  • Accelerate Incident Response with Contextual Intelligence Identify anomalies, trigger alerts, and auto-generate incident tickets to close the loop between detection and remediation.
×
 

Agenda

  • June 26

    The Enterprise Security Workshop: IAM and SIEM in Action
      • 09:00 AM - 09:15 AM
         

        ManageEngine Introduction

      • 09:15 AM - 09:45 AM
         

        Keynote by Paul C. Dwyer, CEO | Chief Architect of Cyber Security

      • 09:45 AM - 10:45 AM
         
        IAM SESSION

        Unified IAM for the Modern Enterprise: Automate Lifecycle, Orchestrate Access, Govern with AD360

        • Identity at the Core: The First Line of Cyber Defense
        • Identity Lifecycle with AD360
        • Governance in Microsoft 365
        • SharePoint Governance Snapshot
      • 10:45 AM - 11:00 AM
         

        Break

      • 11:00 AM - 12:00 PM
         
        IAM SESSION

        Strengthening IAM Visibility, Control & Compliance with AD360

        • ADAudit Plus: Real-Time Monitoring for IAM Integrity
        • ADSelfService Plus: IAM Starts at the User’s Fingertips
        • Compliance Reporting and Unified Visibility
      • 12:00 PM - 12:30 PM
         
        IAM SESSION

        The IAM Journey in Action: From Onboarding to Oversight with AD360

        • Provision User in AD + M365 (ADManager Plus + M365 Manager Plus)
        • Self-Service Enrollment + MFA (ADSelfService Plus)
        • Audit Access & Group Changes (ADAudit Plus)
        • M365 & SharePoint Oversight (M365 Manager Plus + SharePoint Manager Plus)
      • 12:30 PM - 01:15 PM
         

        Lunch

      • 01:15 PM - 02:30 PM
         
        SIEM SESSION

        Threat Detection, Investigation & Behavioral Analytics

        Use Case Deep Dive


        • Cybersecurity visibility gaps
        • Importance of identity-driven security in today’s threat landscape
        • Centralized Log Management and Real-time SIEM
        • Detecting Anomalies with Behavioral Analytics
      • 02:30 PM - 03:30 PM
         
        SIEM SESSION

        Identity-Centric Audit, Compliance, and Cloud Security

        • Detecting critical AD changes: GPO, OUs, group membership, privileged accounts
        • Hybrid visibility with Azure AD and Microsoft 365 log integration
        • Navigating SOX, GDPR, HIPAA with Log360’s built-in compliance templates
        • Security of SaaS applications: Exchange Online, SharePoint, OneDrive, Teams
      • 03:30 PM - 04:00 PM
         

        Interactive hands-on session

        • Configure a correlation rule to detect credential stuffing attempts using event patterns from domain controllers.
        • Analyze a user flagged by UEBA with high risk score. Determine cause, behavior deviation, and recommend action
        • A user who normally accesses only finance folders is now modifying files in executive folders and logging in after hours.
        • An admin group was modified without an approved request, and audit logs must be investigated to find who made the change and when.
        • Find a non-admin user accessed sensitive SharePoint files they weren’t assigned to.
        • An internal audit is scheduled, and your team must produce a GDPR/SOX-aligned report showing data access, modification, and permission trails.
        • A hybrid AD user account is compromised. The attacker has accessed critical files, changed permissions, and attempted lateral movement across on-prem and cloud environments.
     

Speakers

  •  

    Paul C Dwyer

    CEO | Chief Architect of Cybersecurity Education | Author | Board Advisor | Mentor | Entrepreneur | Industry Leader | International Speaker

    Learn more
  •  

    Raghul Sridhar

    Regional Manager Support & Customer Success

    Learn more
  •  

    Prasanna Kumar Kulothungan

    Senior Technical Consultant

    Learn more
  •  

    Pranauv Sivapalanisamy

    Product Consultant

    Learn more
  •  

    Venkatesh Babu

    Senior Product Consultant

    Learn more

Best Moments from
our World tour

 
Claim your Spot!

Thanks for registering, We will get back to you shortly

 , Zoho Corporation Pvt. Ltd. All Rights Reserved.