First Time at
Shield 2023?
There is a lot to explore and Live - let us help you navigate the conference.
Highlights &
Benefits of this Convention
-
Learn to orchestrate and automate user life cycle management across applications
effortlessly.
-
Know how MFA-powered SSO can help seamlessly access cloud apps while ensuring
identity security.
-
Discover how to implement Zero Trust using role-based access control and prevent
privilege creep.
-
Step up your security by learning to adopt proactive security with risk posture
management.
-
Walk in the path of the attackers to neutralise their techniques and boost up your
defensive mechanisms.
-
Learn to get visibility into your hybrid or muti-cloud environment and be compliant
with regulatory mandates.
Know Your Presenters
-
Vivin
Senior Technical Evangelist
Vivin is a senior technology evangelist for the ADSolutions team at ManageEngine, a division of Zoho Corporation. He presents POCs and takes care of implementation as well as product training for ADSolutions customers across the globe. He is also a regular speaker on the latest trends and best practices in Windows infrastructure management, presenting at international seminars and user conferences conducted by ManageEngine.
-
Harish
Senior Technical Evangelist
Harish Sekar is a senior technology evangelist for the ADSolutions team at ManageEngine, a division of Zoho Corporation. He is regularly seen presenting at international conferences and seminars on how to leverage technology better. He specializes in guiding IT administrators and security professionals across the globe on how to administer their hybrid Active Directory better and strengthen their organizations' security.
Agenda
08:00 - 9:00 AM
Registration and Breakfast
09:00 - 10:30 AM
The Basics of Zero Trust: Essential Steps to Implementation
- Eliminating redundancy and human errors, and enhancing business processes through automation
- Delegating tasks to technicians instead of server/admin portal access
- Enforcing centralized granular password policies across Active Directory and cloud applications.
- Applying adaptive MFA to elevate trust in identities and mitigate user impersonation
10:30 - 10:45 AM
Coffee Break
10:45 - 12:15 PM
Cyberattacks and business: Bridging the Gap through zero trust
- Surveying the Landscape, starting with Active Directory/Azure AD and immediate security gaps to fill
- Understanding new breaches and ecosystem vulnerabilities around hybrid work
- Data security, the importance of data protection and user behavior prediction
- Cyber resilience and how Zero trust can help
12:15 - 1:30 PM
Lunch