✕
X
Watch now
Schedule a call with our experts to know more about our solutions
By clicking 'Play now', you agree to processing of personal data according to the
Privacy Policy.
Topics covered
ML / AI in SIEM
SIEM
Zero Trust
Password security
IAM
Cloud security
Watch now
Cybersecurity and IAM
webinar series
Time
10 AM EST | 3 PM GMT
Date
Oct 19, 26, Nov 2, 9, 16 and 23
Watch Now
Sessions
Session 1
ML / AI in SIEM
Date & Time
Oct 19 at 10 AM EST | 3 PM GMT
Session 2
SIEM
Date & Time
Oct 26 at 10 AM EST | 3 PM GMT
Session 3
Zero Trust
Date & Time
Nov 2 at 10 AM EST | 3 PM GMT
Session 4
Password security
Date & Time
Nov 9 at 10 AM EST | 3 PM GMT
Session 5
IAM
Date & Time
Nov 16 at 10 AM EST | 3 PM GMT
Session 6
Cloud security
Date & Time
Nov 23 at 10 AM EST | 3 PM GMT
Speakers
Vivin
Senior technical evangelist
Ram
Technical evangelist
Megha
Technical evangelist
Sharada
Technical evangelist
Andy
Technical evangelist
Harish
Senior technical evangelist
Highlights
Watch presentations from speakers with impeccable credentials.
Consult with our experts. Discuss your IAM and cybersecurity challenges with them.
Listen to our experts' take on the latest trends and happenings from the IAM and cybersecurity space.
Dedicated Q&A hour at the end of each session.
Learn from the comfort of your home or workplace.
Agenda
Oct 19
ML / AI in SIEM
Oct 26
SIEM
Nov 2
Zero Trust
Nov 9
Password security
Nov 16
IAM
Nov 23
Cloud security
ML / AI in SIEM
The need for ML in today's era of cybersecurity.
How to solve tasks.
Using risk scores, anomaly modeling and seasonality for threat detection.
What the future holds for ML in security information and event management (SIEM).
Fundamentals of SIEM
Fundamentals of SIEM: Real-time analysis of all alerts from across the network.
The major components of an effective SIEM solution.
Building a next-gen security operations center from the ground up.
Metrics to measure the effectiveness of your SOC.
Why Zero Trust should be at the forefront of your IAM strategy
Provide frictionless access with MFA and SSO.
Validate changes with a request and approve process.
Employ the principle of least privilege (POLP) and just-in-time (JIT) access.
Disable accounts of former employees automatically.
Monitor and audit privileged user activity.
Improved password security in the times of remote working
Implement conditional access based on risk factors such as the user's IP address, time of access, and geolocation.
Enforce MFA for VPN logons to protect remote workforce.
Enhanced password policy for a hybrid environment.
Overview of native delegation
Implementing least privilege delegation for IAM.
Checklist for effectual Identity creation and management.
Automate IAM tasks by exerting supervision.
Cloud security - Azure fundamentals
Running through basics of Azure and its limitations.
Azure Security Center and the security alerts it provides.
Covering the gaps in Azure Security, steps to implement ATP.
How ManageEngine Log360 can help monitor your Azure infrastructure.
Upcoming events
IT security
View more
▸
IAM
View more
▸
Subscribe to our
Monthly Events Newsletter
Thank you for subscribing.
Please enter a valid email id
By clicking
Subscribe now
you agree to processing of personal data according to the
Privacy Policy
.
Our solutions
are trusted by
Zoho Corporation Pvt. Ltd. All rights reserved.