GDPR and IT Security Seminar

At this on-demand seminar in collaboration with ManageEngine, you will see how to prepare your Active Directory for GDPR and advanced IT attacks.

Watch on-demand


Get answers about GDPR

Presentations that will help you tackle your various GDPR challenges head-on

Fighting security threats

Learn how to combat various security threats with effective log management techniques

Active Directory trends

Get informed about the next-gen Active Directory management trends and techniques

Knowledgeable presenter

Derek Melber has 15 years of Active Directory training experience.

Consult with our experts

Ask questions and get answers to your GDPR, Active Directory, and IT security challenges.


This seminar is now available on-demand so you can see it when it suits you and it is easy to navigate to the different seminar sessions


Derek Melber
Technical Evangelist & Active Directory MVP, ManageEngine

As an Active Directory MVP, he is sought after globally for his knowledge, insight, and keen understanding of the Windows product line, especially Active Directory. Derek has extensive experience in offering solutions to Active Directory change monitoring challenges. He writes for, speaks to, and educates thousands of IT professionals around the world, every year through his blogs, books, seminars, webinars, etc.


60 minutes
Final Preparations for the GDPR
  • How to best design and manage users, groups, and organizational units in Active Directory
  • Suggestions on file, database, and folder design strategies
  • Deep dive into access control list design and strategies
  • How to set up auditing to track all object changes and resource access
  • Solutions for breach detection and reporting
27 minutes
Leveraging SIEM Advanced Technologies
In this session you will learn:
  • The limitations that Microsoft Event Viewer possesses
  • Powerful use cases that can help you manage security and access better
  • Customization concepts that will allow you to tailor your SIEM solution for your environment
  • How to leverage correlation to detect anomalies and attacks better
50 minutes
Group policy: Monitoring, alerting, and restoring
  • Why some GPO settings remain on the target computer even after the GPO no longer applies
  • How to centralize all administrative template settings
  • What is required to track all Group Policy changes
  • The simplicity of being able to receive a real-time alert when Group Policy changes
  • The ease of restoring GPO settings
34 minutes
Negating the most common internal attacks
  • How to reduce and eliminate attacks against Microsoft authentication protocols
  • Why it is essential to protect your network against common communication protocol attacks
  • What it takes to reduce the attacks against password hashes and tickets
  • How to reduce and monitor privilege escalation attack

Watch the seminar now

Fill in your details to watch the seminar on-demand.