Closed
Closed

An IAM and Cybersecurity Workshop

United States  

  • Milwaukee

    The Westin Milwaukee

    07 Aug, 2025
  • Columbus

    Hilton Columbus
    Downtown

    12 Aug, 2025
  • Detroit

    Westin Book
    Cadillac Detroit

    14 Aug, 2025

Thank you for your interest, but we regret to inform you that registrations are now closed.

Thank you for your interest, but we regret to inform you that registrations are now closed.

    Play Now

A lookback at our
Shield workshop

30

Countries

10000

Participants

50

Cities

60

Seminars

10

Domain Experts

40

Speakers

   

Highlights &
Benefits of this Workshop

  • Learn how to set-up continuous change monitoring and alerting for your AD environment.
  • Learn how to set-up continuous change monitoring and alerting for your AD environment.
  • Learn how to improve employee productivity and reduce help desk costs with password self-service, SSO, and password sync.
  • Know the best practices for Active Directory management from across the globe.
  • Know how to combat sophisticated attacks with advanced log management & security auditing techniques.
  • Consult with our experts. Discuss your Active Directory and IT security challenges with them.
×
 

Agenda

  • Aug 07

    Milwaukee
  • Aug 12

    Columbus
  • Aug 14

    Detroit
      • 09:00 AM - 10:00 AM
         

        Arrival & Breakfast Networking

      • 10:00 AM - 10:15 AM
         

        Introduction to ManageEngine

      • 10:15 AM - 11:15 AM
         

        Unified IAM for the Modern Enterprise: Automate Lifecycle, Orchestrate Access, Govern with AD360

        • Identity at the Core: The First Line of Cyber Defense
        • Identity Lifecycle with AD360
        • Governance in Microsoft 365
        • SharePoint Governance Snapshot
      • 11:15 AM - 11:30 PM
         

        Tea break

      • 11:30 AM - 12.30 PM
         

        Audit, Empower, Recover - Strengthening Every Stage of the Identity Lifecycle

        • Establishing Continuous Audit Coverage
        • Real-Time Threat Detection and Response
        • Modern Self-Service Access
        • Enforcing Identity Hygiene
        • Proactive Active Directory Backup Strategy
        • Granular & Instant Recovery for Business Continuity
        • Compliance-Driven Identity Governance
      • 12:30 AM - 01:00 PM
         

        The IAM Journey in Action: From Onboarding to Oversight with AD360

      • 01:00 PM - 02:00 PM
         

        Lunch

      • 02:00 PM - 03:00 PM
         

        Uncover Hidden Threats: Detecting Risks Through Logs, Behavior, and Access Intelligence

        • Bridging Visibility Gaps in Modern IT Environments
        • Importance of Identity-driven Security in Today’s Threat Landscape
        • SIEM in Action: Real-Time Correlation and Alerting
        • Behavior Analytics for Early Detection
      • 03:00 PM - 03:30 PM
         

        Audit, Comply, and Respond: Building User-Centric Security and Resilience

        • Detecting critical AD changes: GPO, OUs, group membership, privileged accounts
        • Unified Visibility Across Cloud and On-Prem Directories
        • Reducing Response Time with Security Orchestration and Automation
        • Achieving and Maintaining Regulatory Compliance
      • 03:30 PM - 04:00 PM
         

        Interactive hands-on session

        • The Threat Detection Journey in Action: From Ingestion to Investigation with Log360
      • 09:00 AM - 10:00 AM
         

        Arrival & Breakfast Networking

      • 10:00 AM - 10:15 AM
         

        Introduction to ManageEngine

      • 10:15 AM - 11:15 AM
         

        Unified IAM for the Modern Enterprise: Automate Lifecycle, Orchestrate Access, Govern with AD360

        • Identity at the Core: The First Line of Cyber Defense
        • Identity Lifecycle with AD360
        • Governance in Microsoft 365
        • SharePoint Governance Snapshot
      • 11:15 AM - 11:30 PM
         

        Tea break

      • 11:30 AM - 12.30 PM
         

        Audit, Empower, Recover - Strengthening Every Stage of the Identity Lifecycle

        • Establishing Continuous Audit Coverage
        • Real-Time Threat Detection and Response
        • Modern Self-Service Access
        • Enforcing Identity Hygiene
        • Proactive Active Directory Backup Strategy
        • Granular & Instant Recovery for Business Continuity
        • Compliance-Driven Identity Governance
      • 12:30 AM - 01:00 PM
         

        The IAM Journey in Action: From Onboarding to Oversight with AD360

      • 01:00 PM - 02:00 PM
         

        Lunch

      • 02:00 PM - 03:00 PM
         

        Uncover Hidden Threats: Detecting Risks Through Logs, Behavior, and Access Intelligence

        • Bridging Visibility Gaps in Modern IT Environments
        • Importance of Identity-driven Security in Today’s Threat Landscape
        • SIEM in Action: Real-Time Correlation and Alerting
        • Behavior Analytics for Early Detection
      • 03:00 PM - 03:30 PM
         

        Audit, Comply, and Respond: Building User-Centric Security and Resilience

        • Detecting critical AD changes: GPO, OUs, group membership, privileged accounts
        • Unified Visibility Across Cloud and On-Prem Directories
        • Reducing Response Time with Security Orchestration and Automation
        • Achieving and Maintaining Regulatory Compliance
      • 03:30 PM - 04:00 PM
         

        Interactive hands-on session

        • The Threat Detection Journey in Action: From Ingestion to Investigation with Log360
      • 09:00 AM - 10:00 AM
         

        Arrival & Breakfast Networking

      • 10:00 AM - 10:15 AM
         

        Introduction to ManageEngine

      • 10:15 AM - 11:15 AM
         

        Unified IAM for the Modern Enterprise: Automate Lifecycle, Orchestrate Access, Govern with AD360

        • Identity at the Core: The First Line of Cyber Defense
        • Identity Lifecycle with AD360
        • Governance in Microsoft 365
        • SharePoint Governance Snapshot
      • 11:15 AM - 11:30 PM
         

        Tea break

      • 11:30 AM - 12.30 PM
         

        Audit, Empower, Recover - Strengthening Every Stage of the Identity Lifecycle

        • Establishing Continuous Audit Coverage
        • Real-Time Threat Detection and Response
        • Modern Self-Service Access
        • Enforcing Identity Hygiene
        • Proactive Active Directory Backup Strategy
        • Granular & Instant Recovery for Business Continuity
        • Compliance-Driven Identity Governance
      • 12:30 AM - 01:00 PM
         

        The IAM Journey in Action: From Onboarding to Oversight with AD360

      • 01:00 PM - 02:00 PM
         

        Lunch

      • 02:00 PM - 03:00 PM
         

        Uncover Hidden Threats: Detecting Risks Through Logs, Behavior, and Access Intelligence

        • Bridging Visibility Gaps in Modern IT Environments
        • Importance of Identity-driven Security in Today’s Threat Landscape
        • SIEM in Action: Real-Time Correlation and Alerting
        • Behavior Analytics for Early Detection
      • 03:00 PM - 03:30 PM
         

        Audit, Comply, and Respond: Building User-Centric Security and Resilience

        • Detecting critical AD changes: GPO, OUs, group membership, privileged accounts
        • Unified Visibility Across Cloud and On-Prem Directories
        • Reducing Response Time with Security Orchestration and Automation
        • Achieving and Maintaining Regulatory Compliance
      • 03:30 PM - 04:00 PM
         

        Interactive hands-on session

        • The Threat Detection Journey in Action: From Ingestion to Investigation with Log360
     

Speakers

  •  

    Karthick Seetharaman

    Solution Architect

    Learn more
  •  

    Sreejith K

    Senior Onboarding Specialist

    Learn more
  •  

    Venkatesh Mahalingam

    Regional Manager - Technical Support

    Learn more
  •  

    Paul Kevin

    Lead - Technical Consultant

    Learn more
  •  

    Sathyapriyan Govindan

    Lead - Technical Consultant

    Learn more
× ]

Best Moments from
our World tour

 
Claim your Spot!

Thanks for registering, We will get back to you shortly

 , Zoho Corporation Pvt. Ltd. All Rights Reserved.