First Time at
Shield 2023?
There is a lot to explore and Live - let us help you navigate the conference.
Highlights &
Benefits of this Convention
-
Learn to orchestrate and automate user life cycle management across applications
effortlessly.
-
Know how MFA-powered SSO can help seamlessly access cloud apps while ensuring
identity security.
-
Discover how to implement Zero Trust using role-based access control and prevent
privilege creep.
-
Step up your security by learning to adopt proactive security with risk posture
management.
-
Walk in the path of the attackers to neutralise their techniques and boost up your
defensive mechanisms.
-
Learn to get visibility into your hybrid or muti-cloud environment and be compliant
with regulatory mandates.
Know Your Presenters
-
Harish
Senior Technical Evangelist
Harish Sekar is a senior technology evangelist for the ADSolutions team at ManageEngine, a division of Zoho Corporation. He is regularly seen presenting at international conferences and seminars on how to leverage technology better. He specializes in guiding IT administrators and security professionals across the globe on how to administer their hybrid Active Directory better and strengthen their organizations' security.
-
Koushik
Cybersecurity Expert
Koushik is a Cybersecurity expert at ManageEngine. He's passionate about speaking with network administrators, understanding their environments and delivering tailor made solutions for cybersecurity and providing solution recommendations. Koushik specializes in understanding constantly evolving threat models and dishing out zero trust implementations and factoring AI and MI into custom cybersecurity solutions.
Agenda
08:00 - 9:00 AM
Registration
09:00 - 10:30 AM
The Basics of Zero Trust: Essential Steps to Implementation
Part 1: Automate, Delegate, Manage, and Recover (09:00 - 09:45 AM)
- Eliminating redundancy and human errors, and enhancing business processes through automation
- Delegating tasks to technicians instead of server/admin portal access
- 5 things to do immediately if you suspect an account has been compromised
- One click recovery from accidental Active Directory and M365 changes
Part 2: Strengthening the human element in the equation (09:45 - 10:30 AM)
- Enforcing centralized granular password policies across Active Directory and cloud applications.
- Applying adaptive MFA to elevate trust in identities and mitigate user impersonation
10:30 - 10:45 AM
Coffee Break
10:45 - 12:15 PM
Cybersecurity weak spots to address before adopting Zero Trust approach
Part 1: Addressing vital W's (who,what,when and where) of IT Security (10:45 - 11:30 AM)
- ITSecurity Identifying security misconfigurations that can lead to breaches
- A comprehensive security strategy to safeguard domain admin accounts from misuse.
- Azure Security-what's missing?
- Data security, the importance of data protection and user behavior prediction
Part 2: Cyberattacks are expensive: A SIEM solution shouldn't be (11:30 AM - 12:15 PM)
- Why SIEM? What to expect from one?
- Customizing reports, attack detection and remediation mechanisms to
- Importance of integrating SIEM with threat feeds and ticketing ITSM tools.
- Cyber resilience and how Zero trust can help
12:15 - 1:30 PM
Lunch
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
- Eliminating redundancy and human errors, and enhancing business processes through automation
- Delegating tasks to technicians instead of server/admin portal access
- 5 things to do immediately if you suspect an account has been compromised
- One click recovery from accidental Active Directory and M365 changes
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA
08:30 - 09:15
Increasing password security and incorporating MFA