Thank you for registering! You might be interested in

You might also be interested in

Thank you for registering. We've emailed the instructions to join the sessions. We look forward to seeing you.
Mail sent successfully.
Thank you for the referral.
Thank you for registering! We'll get in touch with you shortly.
   
 

A Cybersecurity and IAM Online Seminar

Attend and stand a chance to win an Amazon gift card.

 

Register Now

  •  
  •  
  •  
  • Please choose your country
    Please choose your state
  • ManageEngine Products*

    Please select products.
  • By clicking 'Register Now', you agree to processing of personal data according to the Privacy Policy.

Highlights & Benefits of this Shield Virtual Seminar

Engage with our panel of experts during live Q&A sessions. Get personalized answers to your most pressing security concerns and learn from questions posed by your peers in the industry.

Know the best practices for Active Directory management, advanced log management, and security auditing techniques from across the globe.

Experience the online version of our flagship Shield seminars.

Learn about emerging cybersecurity threats and the advanced IAM techniques that can help you safeguard your organization against them. Stay one step ahead with strategies that enhance both security and compliance

Join the seminar from anywhere in the world with easy online access. All sessions are available on-demand, allowing you to revisit key points and insights at your convenience.

Discover how top organizations are successfully navigating security challenges with IAM solutions and advanced cybersecurity strategies. These case studies provide actionable insights that you can apply in your own environment.

Know

Sessions &
Labs

  • Shield NXG 2025 - A Cybersecurity and IAM Online Seminar

    Feb 19

    at 11:00 AM ET

  • Shield NXG 2025 - A Cybersecurity and IAM Online Seminar

    Feb 27

    at 2 PM IST

  • 11:00 AM - 12:30 PM

    Managing AD and Microsoft 365 the hybrid way.

     
    • Review and manage inappropriate privileges given to users.
    • Standardize onboarding, modification and deprovisioning users in AD and Microsoft 365.
    • Automate routine AD tasks by incorporating a business workflow.
    • Empower technicians to manage AD and Microsoft 365 without delegating excessive rights.
    12:30 PM - 2:00 PM

    How to get the best out of your SIEM solution: A primer for everyone

     
    • The SIEM basics: An introduction and how to get log collection right
    • Building your unique security and compliance use cases
    • Auditing PowerShell to defend against living-off-the-land attacks
    • Protecting against insider threats
    • Protecting against data exfiltration
    • Protecting your cloud infrastructure from data leaks
    • Adhering to compliance mandates
  • 08:30AM - 09:00AM

    Security-driven Active Directory Management

     
    • Prevent attacks due to stolen or compromised passwords with 2FA.
    • Empower users to seamlessly reset passwords with MFA.
    • Comply with IT best practices for better passwords.
    • Control access to apps and authenticators based on self-service policies.
    09:00AM - 10:30AM

    Modern MFA to protect your system, applications and data.

     
    • Prevent attacks due to stolen or compromised passwords with 2FA.
    • Empower users to seamlessly reset passwords with MFA.
    • Comply with IT best practices for better passwords.
    • Control access to apps and authenticators based on self-service policies.
Know Your

Presenters

 
Koushik

Product expert

 
Ranjith

Product expert

 
Hariharan

Product expert

 
Shehnaaz

Product expert

What our attendees say

   
  • A great place to learn about how the products can assist in gathering all of the details that a System Administrator could gather from just Windows Event logs, but in a much easier and more substantive manner.

    Chris Townsend

    System Administrator II

  • It was a wonderful session and very enlightening. Key takeaways are the issues we have in today's world due to Security attacks and how we should be well prepared to avoid it. The tools we can use to avoid such attacks.

    Piyush Makkar

    Senior Project Manager, HCL Technologies Ltd

  • The threats are out there -- it's essential to remain vigilant! Thanks for the information presented.

    Tucker Dawg

    National CASA/GAL Association

  • Well organized with lots of actionable information.

    Mark Jones

    IT Security Manager, Yukon-Kuskokwim Health Corp

  • Excellent speakers. I will be digging deeper into the topics discussed today.

    Adam Thompson

    ITAS, Michigan Virtual

 
Subscribe to our Event Digest

Thank you for subscribing.

  •  
     
  •  
  • By clicking 'Subscribe now', you agree to processing of personal data
    according to the Privacy Policy.

ManageEngine A division of Zoho Corporation,

4141 Hacienda Drive, Pleasanton, California 94588, USA

© 2024 Zoho Corporation Pvt. Ltd. All rights reserved