Register Now
Register Now

Security Information and
Event Management Workshop

United Kingdom   

  • London

    Wembley, stadium

    17 June, 2025
  • Manchester

    Emirates Old Trafford
    Stadium

    19 June, 2025
  • Birmingham

    Think Tank Museum

    24 June, 2025

Register for the Workshop

Thank you for your interest, but we regret to inform you that registrations are now closed.

  •  
  •  
  •  
  •  
  •  
  • By clicking 'Claim your spot now' you agree to processing of personal data according to the Privacy Policy.
    Play Now

A lookback at our
Shield workshop

30

Countries

10000

Participants

50

Cities

60

Seminars

10

Domain Experts

40

Speakers

   

Highlights &
Benefits of this Workshop

  • Automate User Lifecycle Management: Learn to streamline the onboarding and offboarding processes by automating user account creation and deactivation across Active Directory (AD) and Microsoft 365, enhancing efficiency and security.
  • Implement Secure Access Controls: Discover methods to enforce role-based access controls and approval workflows, ensuring that users have appropriate permissions aligned with their job functions.
  • Enhance Security with Adaptive MFA: Explore the deployment of Multi-Factor Authentication (MFA) for AD, VPNs, and cloud applications, incorporating adaptive policies to respond to varying risk levels.
  • Configure Self-Service Password Management: Set up self-service password reset and account unlock workflows to reduce help desk workload and empower users, improving productivity and security.
  • Monitor and Audit in Real-Time: Gain skills to track changes in AD and Entra ID, detect insider threats, and set up real-time alerts for suspicious activities, aiding in proactive threat management.
  • Achieve Compliance with Automated Reporting: Learn to generate reports that align with standards such as NIS2, GDPR, ISO 27001, and DORA, facilitating compliance and readiness for audits.
×
 

Agenda

  • June 17

    London
  • June 19

    Manchester
  • June 24

    Birmingham
    • 08:00 - 9:00 AM
       

      Registration & Networking Breakfast

    • 09:00 AM - 09:15 AM
       

      ManageEngine Introduction

    • 09:15 AM - 09:45 AM
       

      Guest Speaker Session

    • 09:45 AM - 10:45 AM
       

      Foundation of Cybersecurity essentials: Bridging threat detection and response.

      • Importance of Cybersecurity Essentials Today
      • Understanding Threat Vectors and Visibility Gaps
      • What are Log Sources and Why They Matter (AD, Web Servers, Databases, Cloud Apps)
      • Anatomy of a Cyber Attack: Log-Based Detection Opportunities
      • Key Visibility Gaps in Traditional IT Environments
    • 10:45 AM - 11:00 AM
       

      Coffee & Networking Break

    • 11:00 AM - 12:30 PM
       

      Unified Log Management with Log360

      • Topic: Architecting a Centralized Log Collection Framework
      • Log360 Architecture Deep Dive (Log Collection, Storage, Parsing)
      • Agent-based vs. Agentless Data Collection
      • Real-time vs. Batch Processing
      • Use Case: Monitoring Windows and Linux servers for unauthorized changes
    • 12:30 PM - 01:30 PM
       

      Lunch & Networking

    • 01:30 PM - 02:30 PM
       

      Real-Time Threat Detection and Incident Forensics

      • Rule-Based Correlation vs. Behavioral Analytics
      • Building a Security Response Plan with Log360
      • Integration with Ticketing and Alert Systems
      • Extending SIEM with Threat Intelligence and SOAR Capabilities
      • Integrating Log360 with AD, Firewall, Endpoint, Threat Feeds
    • 02:30 PM - 03:30 PM
       

      Compliance Reporting and Audit Readiness

      • Meeting Regulatory Requirements Using Log360
      • Overview of Compliance Standards (GDPR, HIPAA, ISO 27001, SOX)
      • Prebuilt compliance and custom report best practices
    • 03:30 PM - 04:00 PM
       

      Interactive hands-on session

      • Identify critical log sources for a sample enterprise network
      • Configure log collection from a simulated Linux machine
      • Define an alert policy for unauthorized privilege escalation
      • Investigate a suspicious login chain using Log360 forensic tools
      • Create and export a PCI-DSS readiness report
      • Investigate a high-risk user flagged by UEBA
      • Configure an alert with automatic email & ticket generation
    • 08:00 - 9:00 AM
       

      Registration & Networking Breakfast

    • 09:00 AM - 09:15 AM
       

      ManageEngine Introduction

    • 09:15 AM - 10:45 AM
       

      Foundation of Cybersecurity essentials: Bridging threat detection and response.

      • Importance of Cybersecurity Essentials Today
      • Understanding Threat Vectors and Visibility Gaps
      • What are Log Sources and Why They Matter (AD, Web Servers, Databases, Cloud Apps)
      • Anatomy of a Cyber Attack: Log-Based Detection Opportunities
      • Key Visibility Gaps in Traditional IT Environments
    • 10:45 AM - 11:00 AM
       

      Coffee & Networking Break

    • 11:00 AM - 12:30 PM
       

      Unified Log Management with Log360

      • Topic: Architecting a Centralized Log Collection Framework
      • Log360 Architecture Deep Dive (Log Collection, Storage, Parsing)
      • Agent-based vs. Agentless Data Collection
      • Real-time vs. Batch Processing
      • Use Case: Monitoring Windows and Linux servers for unauthorized changes
    • 12:30 PM - 01:30 PM
       

      Lunch & Networking

    • 01:30 PM - 02:30 PM
       

      Real-Time Threat Detection and Incident Forensics

      • Rule-Based Correlation vs. Behavioral Analytics
      • Building a Security Response Plan with Log360
      • Integration with Ticketing and Alert Systems
      • Extending SIEM with Threat Intelligence and SOAR Capabilities
      • Integrating Log360 with AD, Firewall, Endpoint, Threat Feeds
    • 02:30 PM - 03:30 PM
       

      Compliance Reporting and Audit Readiness

      • Meeting Regulatory Requirements Using Log360
      • Overview of Compliance Standards (GDPR, HIPAA, ISO 27001, SOX)
      • Prebuilt compliance and custom report best practices
    • 03:30 PM - 04:00 PM
       

      Interactive hands-on session

      • Identify critical log sources for a sample enterprise network
      • Configure log collection from a simulated Linux machine
      • Define an alert policy for unauthorized privilege escalation
      • Investigate a suspicious login chain using Log360 forensic tools
      • Create and export a PCI-DSS readiness report
      • Investigate a high-risk user flagged by UEBA
      • Configure an alert with automatic email & ticket generation
    • 08:00 - 9:00 AM
       

      Registration & Networking Breakfast

    • 09:00 AM - 09:15 AM
       

      ManageEngine Introduction

    • 09:15 AM - 10:45 AM
       

      Foundation of Cybersecurity essentials: Bridging threat detection and response.

      • Importance of Cybersecurity Essentials Today
      • Understanding Threat Vectors and Visibility Gaps
      • What are Log Sources and Why They Matter (AD, Web Servers, Databases, Cloud Apps)
      • Anatomy of a Cyber Attack: Log-Based Detection Opportunities
      • Key Visibility Gaps in Traditional IT Environments
    • 10:45 AM - 11:00 AM
       

      Coffee & Networking Break

    • 11:00 AM - 12:30 PM
       

      Unified Log Management with Log360

      • Topic: Architecting a Centralized Log Collection Framework
      • Log360 Architecture Deep Dive (Log Collection, Storage, Parsing)
      • Agent-based vs. Agentless Data Collection
      • Real-time vs. Batch Processing
      • Use Case: Monitoring Windows and Linux servers for unauthorized changes
    • 12:30 PM - 01:30 PM
       

      Lunch & Networking

    • 01:30 PM - 02:30 PM
       

      Real-Time Threat Detection and Incident Forensics

      • Rule-Based Correlation vs. Behavioral Analytics
      • Building a Security Response Plan with Log360
      • Integration with Ticketing and Alert Systems
      • Extending SIEM with Threat Intelligence and SOAR Capabilities
      • Integrating Log360 with AD, Firewall, Endpoint, Threat Feeds
    • 02:30 PM - 03:30 PM
       

      Compliance Reporting and Audit Readiness

      • Meeting Regulatory Requirements Using Log360
      • Overview of Compliance Standards (GDPR, HIPAA, ISO 27001, SOX)
      • Prebuilt compliance and custom report best practices
    • 03:30 PM - 04:00 PM
       

      Interactive hands-on session

      • Identify critical log sources for a sample enterprise network
      • Configure log collection from a simulated Linux machine
      • Define an alert policy for unauthorized privilege escalation
      • Investigate a suspicious login chain using Log360 forensic tools
      • Create and export a PCI-DSS readiness report
      • Investigate a high-risk user flagged by UEBA
      • Configure an alert with automatic email & ticket generation
     

External Speakers

  •  

    Issac

    Senior Product Consultant

    Learn more
  •  

    Dinesh

    Lead Product Support

    Learn more
  •  

    Venkatesh Babu

    Senior Product Consultant

    Learn more
×

Best Moments from
our World tour

 
Claim your Spot!

Thanks for registering, We will get back to you shortly

 , Zoho Corporation Pvt. Ltd. All Rights Reserved.