Past Events

ShieldVirtual 2021 - A Cybersecurity and IAM Online Seminar

Presented By MANAGE ENGINE TEAM
07 Sep 2021 3:30 PM
AUSTRALIA
Click here to Register

      Highlights & Benefits

       of this Shield Virtual Seminar

Watch presentations from speakers

with impeccable credential

Know the best practices for Active Directory management from across the globe.

Learn how to set continuous change monitoring and alerting for your AD environment.

Know how to combat sophisticated attacks with advanced log management & security auditing techniques.

Learn how to reduce support calls and make your users self-help with password self-service, SSO, and password synchronization.

Consult with our experts. Discuss your Active Directory and IT security challenges with them.

      Agenda



01:30 PM - 02:15 PM

Managing AD and Microsoft 365 the hybrid way.

  • Review and manage inappropriate privileges given to users.
  • Standardize onboarding, modification and deprovisioning users in AD and Microsoft 365.
  • Automate routine AD tasks by incorporating a business workflow.
  • Empower technicians to manage AD and Microsoft 365 without delegating excessive rights.

02:15 PM - 03:00 PM

Modern MFA to protect your system, applications and data.

  • Prevent attacks due to stolen or compromised passwords with 2FA.
  • Empower users to seamlessly reset passwords with MFA.
  • Comply with IT best practices for better passwords.
  • Control access to apps and authenticators based on self-service policies

03:00 PM - 03:45 PM

6 Active Directory security events that have hit the mainstream in 2021

  • Understanding the attack surface - how ML and AI can detect internal and external attacks.
  • Importance of Hybrid Active Directory and how ML helps in predicting user behavior.
  • Get to know when privileged users are under attack and re-mediate an action plan.
  • Importance of data security and the need for DLP.

03:45 PM - 04:30 PM

Components of an effective SOC: Collection, ingestion, detection and response.

  • Collection: Bringing in data from across the network.
  • Ingestion: Transforming data into enriched and actionable information.
  • Detection: Analyzing possible malicious activity and triaging events.
  • Response: Managing the aftermath of an incident

      Speakers



Webinar Registration Form
*
*
*
*
What are you registering for today?
*

Upcoming Events

HOME