man on the phone in security uniform

Locking Down Salesforce: Prevent, Detect, Respond — A Complete Security Framework

Cyber threats are evolving faster than ever—and for most organizations, the biggest risks stem not from technology gaps, but from preventable identity, access, and human-driven vulnerabilities. Join us for an expert-led session designed to help Salesforce admins, security leads, and IT decision-makers build a resilient security posture rooted in prevention and continuous monitoring.
In this dynamic, practical webinar, Cloud for Good and DigitSec walk through the essential layers of Salesforce security—from enforcing MFA and strengthening identity management to implementing least-privilege access, automating user provisioning, and monitoring your org long after go-live. You’ll also learn how to leverage security products like Salesforce Shield, event monitoring, and Connected Apps to reduce exposure and track suspicious behavior before it becomes a breach.
We’ll pair the technical steps with real-world security fundamentals, including social engineering awareness, password hygiene, centralized access management, and the one factor that influences every breach: the human element.
Finally, we’ll outline exactly what to do if the unexpected happens—how to evaluate activity, contain compromised users, and activate Salesforce tools designed for rapid response.

By the end of the session, attendees will understand:

  • Identity & Authentication Essentials: Why centralized access management (Azure AD / Entra ID, Okta), MFA, and unique passwords are foundational—and how Salesforce integrates with them.
  • Salesforce Configuration for Security: How least-privilege access, profiles, permission sets, User Access Policies, and Connected Apps create a secure, scalable permission model.
  • Continuous Monitoring Practices: How to use Shield, event monitoring, CRM Analytics templates, and trust.salesforce.com for ongoing oversight.
  • Human-Centered Defense: How awareness training (like KnowBe4) reduces social engineering risk and why people remain the most common attack vector.
  • Breach Response Framework: Step-by-step actions to take when a user or system is compromised, from freezing users to reviewing logs and analyzing suspicious events.
Tags:

Date

Feb 19 2026
Expired!

Time

1:15 pm - 2:00 pm