Register Now
Register Now

An IAM and Cybersecurity Workshop

United States  

  • Miami

    Courtyard Marriott Miami Downtown/Brickell Area

    18 Nov, 2025
  • Philadelphia

    Sheraton Philadelphia Downtown

    20 Nov, 2025

Thank you for your interest, but we regret to inform you that registrations are now closed.

    Play Now

A lookback at our
Shield workshop

30

Countries

10000

Participants

50

Cities

60

Seminars

10

Domain Experts

40

Speakers

   

Highlights &
Benefits of this Workshop

  • Learn how to set-up continuous change monitoring and alerting for your AD environment.
  • Learn how to set-up continuous change monitoring and alerting for your AD environment.
  • Learn how to improve employee productivity and reduce help desk costs with password self-service, SSO, and password sync.
  • Know the best practices for Active Directory management from across the globe.
  • Know how to combat sophisticated attacks with advanced log management & security auditing techniques.
  • Consult with our experts. Discuss your Active Directory and IT security challenges with them.
×
 

Agenda

  • Nov 18

    Miami
  • Nov 20

    Philadelphia
      • 09:00 AM - 10:00 AM
         

        Arrival & Breakfast Networking

      • 10:00 AM - 10:15 AM
         

        Introduction to ManageEngine

      • 10:15 AM - 11:15 AM
         

        Unified IAM for the Modern Enterprise: Automate Lifecycle, Orchestrate Access, Govern with AD360

        • Identity at the Core: The First Line of Cyber Defense
        • Identity Lifecycle with AD360
        • Governance in Microsoft 365
        • SharePoint Governance Snapshot
      • 11:15 AM - 11:30 PM
         

        Tea break

      • 11:30 AM - 12.30 PM
         

        Audit, Empower, Recover - Strengthening Every Stage of the Identity Lifecycle

        • Establishing Continuous Audit Coverage
        • Real-Time Threat Detection and Response
        • Modern Self-Service Access
        • Enforcing Identity Hygiene
        • Proactive Active Directory Backup Strategy
        • Granular & Instant Recovery for Business Continuity
        • Compliance-Driven Identity Governance
      • 12:30 PM - 01:00 PM
         

        The IAM Journey in Action: From Onboarding to Oversight with AD360

      • 01:00 PM - 02:00 PM
         

        Lunch

      • 02:00 PM - 03:00 PM
         

        Uncover Hidden Threats: Detecting Risks Through Logs, Behavior, and Access Intelligence

        • Bridging Visibility Gaps in Modern IT Environments
        • Importance of Identity-driven Security in Today’s Threat Landscape
        • SIEM in Action: Real-Time Correlation and Alerting
        • Behavior Analytics for Early Detection
      • 03:00 PM - 03:30 PM
         

        Audit, Comply, and Respond: Building User-Centric Security and Resilience

        • Detecting critical AD changes: GPO, OUs, group membership, privileged accounts
        • Unified Visibility Across Cloud and On-Prem Directories
        • Reducing Response Time with Security Orchestration and Automation
        • Achieving and Maintaining Regulatory Compliance
      • 03:30 PM - 04:00 PM
         

        Interactive hands-on session

        • The Threat Detection Journey in Action: From Ingestion to Investigation with Log360
      • 09:00 AM - 10:00 AM
         

        Arrival & Breakfast Networking

      • 10:00 AM - 10:15 AM
         

        Introduction to ManageEngine

      • 10:15 AM - 11:15 AM
         

        Unified IAM for the Modern Enterprise: Automate Lifecycle, Orchestrate Access, Govern with AD360

        • Identity at the Core: The First Line of Cyber Defense
        • Identity Lifecycle with AD360
        • Governance in Microsoft 365
        • SharePoint Governance Snapshot
      • 11:15 AM - 11:30 PM
         

        Tea break

      • 11:30 AM - 12.30 PM
         

        Audit, Empower, Recover - Strengthening Every Stage of the Identity Lifecycle

        • Establishing Continuous Audit Coverage
        • Real-Time Threat Detection and Response
        • Modern Self-Service Access
        • Enforcing Identity Hygiene
        • Proactive Active Directory Backup Strategy
        • Granular & Instant Recovery for Business Continuity
        • Compliance-Driven Identity Governance
      • 12:30 PM - 01:00 PM
         

        The IAM Journey in Action: From Onboarding to Oversight with AD360

      • 01:00 PM - 02:00 PM
         

        Lunch

      • 02:00 PM - 03:00 PM
         

        Uncover Hidden Threats: Detecting Risks Through Logs, Behavior, and Access Intelligence

        • Bridging Visibility Gaps in Modern IT Environments
        • Importance of Identity-driven Security in Today’s Threat Landscape
        • SIEM in Action: Real-Time Correlation and Alerting
        • Behavior Analytics for Early Detection
      • 03:00 PM - 03:30 PM
         

        Audit, Comply, and Respond: Building User-Centric Security and Resilience

        • Detecting critical AD changes: GPO, OUs, group membership, privileged accounts
        • Unified Visibility Across Cloud and On-Prem Directories
        • Reducing Response Time with Security Orchestration and Automation
        • Achieving and Maintaining Regulatory Compliance
      • 03:30 PM - 04:00 PM
         

        Interactive hands-on session

        • The Threat Detection Journey in Action: From Ingestion to Investigation with Log360
     

Speakers

  •  

    Bharathwajan Swaminathan

    Senior Technical Consultant

    Learn more
  •  

    Jagdish G

    Product Consultant

    Learn more
  •  

    Ranjith Kumar

    Lead - Technical Consultant

    Learn more
× ]

Best Moments from
our World tour

 
Claim your Spot!

Thanks for registering, We will get back to you shortly

 , Zoho Corporation Pvt. Ltd. All Rights Reserved.