koenig-logo

Advanced Security Strategies in Salesforce

11 Nov 2025   07:30 AM CST

  • Free Webinar
  • Live Q&A
  • Free Participation Certificate
  • Learn from Industry Experts

Learn More About This Topic

Webinar Overview
In this webinar we will dive into the critical aspects of maintaining robust security within Salesforce. We'll explore comprehensive strategies to safeguard our data with salesforce’s security and access control mechanisms. Learn best practices and advanced techniques to protect your organization from potential security issues and ensure salesforce orgs’ setup with ideal security standards
Key Points

  • Understanding Salesforce's security model and architecture.
  • Hands on at basic to advanced security model implementation.
  • Best practices for user roles, profiles, and permission sets.
Meet The Trainer
Sanskriti Joshi
Sanskriti Joshi

Sanskriti Joshi is a seasoned Salesforce Corporate Trainer and Consultant with 5 years of experience, leading 10+ industry projects, and specializing in customizing Salesforce CRM for business growth. She's trained 150+ professionals globally, including at Infosys and Tech Mahindra, and is associated with Koenig since June 2024.

Register for the Webinar
Registration successful!
Details have been shared over email.
Explore More Webinars
Integrating ISO/IEC 27001 and ISO 31000 - A Unified Approach to Information Security and Risk Control
Show More

Webinar Summary:

This webinar explores the strategic integration of ISO/IEC 27001 and ISO 31000 to create a unified approach to information security and risk control. This webinar will cover how aligning security controls with broader risk management practices enhances resilience, minimizes vulnerabilities, and improves decision-making processes. The session emphasizes on practical steps for mapping risk treatment strategies, establishing centralized risk registers, and addressing integration challenges. Attendees will gain insights into real-world examples where integrated frameworks helped organizations strengthen security postures and mitigate operational risks effectively.

11 Nov 2025 | 02:30 AM CST   1 Hour

Master Endpoint Security - Streamline Device Management and Protect Your Digital Workspace
Show More

Webinar Summary:

Endpoint administration, also known as endpoint management, is the process of managing and securing all the devices that connect to an organization's network. These "endpoints" can be anything from laptops, desktops, and smartphones to servers, point-of-sale systems, and even IoT devices. With the rise of remote work and Bring Your Own Device (BYOD) policies, the number and diversity of endpoints have grown, making effective administration a critical component of modern IT and cybersecurity.

11 Nov 2025 | 01:30 AM CST   1 Hour

Cyber Hygiene - Best Practices for Individuals and Businesses
Show More

Webinar Summary:

This webinar will provide a comprehensive guide to maintaining strong cyber hygiene to protect personal and business data from cyber threats. Participants will learn essential practices such as using strong passwords, enabling multi-factor authentication, regularly updating software, and recognizing phishing attempts. For businesses, the session will cover topics like securing endpoints, implementing regular backups, monitoring network activity, and ensuring employee cybersecurity training. Real-life examples will illustrate the consequences of poor cyber hygiene and the benefits of proactive measures. By the end of the webinar, individuals and organizations will be empowered with practical steps to create a safer digital environment.

11 Nov 2025 | 03:30 AM CST   1 Hour