Free IT Training Events: Expert Webinars & Workshops
To keep you informed.
Upcoming Live IT Training Events
(Free) Webinar – What Recent Cyber-Breaches Teach Us About Protecting Your Business
Wednesday, 18 March 2026 | 10:00-10:30 AM | Online
Learning from Others’ Mistakes: Real Cyber-Breach Insights for NZ Businesses
Every cyber-breach tells a story—and the best way to protect your business is learning from others’ experiences before they become your own.
Join us for a focused 30-minute session examining recent cyber-breaches affecting businesses like yours. We’ll move beyond the headlines to uncover the practical lessons that matter most for New Zealand businesses.
You’ll discover:
- The common vulnerabilities exploited in recent major breaches
- Warning signs that preceded these incidents—and how to spot them in your business
- Specific, actionable steps that could have prevented each breach
- How to assess whether similar vulnerabilities exist in your environment
- What “reasonable security measures” actually means for insurance and compliance
This isn’t about fear—it’s about learning. We’ll translate real-world breach experiences into practical insights you can apply immediately to strengthen your business resilience.
Who should attend: Business owners, executives, and decision-makers responsible for organizational risk management.
Duration: 30 minutes
Format: Interactive webinar with live Q&A
Register now to gain clarity on your cybersecurity journey and how to protect your organisation.
AI Innovation Circle (Free)
Join other business managers in an honest, collaborative exploration of AI. No sales pitches. No unrealistic promises. Just real businesses sharing their genuine experiences, challenges, and solutions.
NExt Session – Thursday, 26 March 2026
Story circle format where participants share their AI journey so far, address myths and fears, and form exploration partnerships. Focus on honest discussion about what AI actually means for small businesses.
(Free) Webinar – Beyond Antivirus: Understanding MDR and ITDR for Modern Cyber Defence
Wednesday, 15 APril 2026 | 10:00-10:30 AM | Online
Your traditional security isn’t stopping today’s attacks. Here’s what will.
The Problem Every NZ Business Faces
Your business has antivirus software. You have firewalls. You’ve implemented email filtering. Yet cybercriminals are increasingly successful at bypassing these traditional defences using sophisticated techniques that don’t trigger conventional security alerts.
The uncomfortable truth? Most modern breaches happen despite having security measures in place. Attackers aren’t breaking down your doors—they’re stealing legitimate credentials and walking right through them.
Understanding Managed Detection and Response (MDR)
- Why assuming threats will get past your defences is smarter than assuming they won’t
- How continuous monitoring and expert threat hunting catch what traditional security misses
- The difference between having security tools and having someone watching them 24/7
- Real-world example: How rapid detection prevents ransomware from spreading
Understanding Identity Threat Detection and Response (ITDR)
- Why 80% of breaches now involve compromised credentials, not technical exploits
- How attackers use legitimate accounts to move through your systems undetected
- What makes identity systems uniquely vulnerable and why they need specialized protection
- The attack patterns ITDR stops: credential theft, privilege escalation, lateral movement
How These Work Together
- Why you need both environment monitoring (MDR) and identity protection (ITDR)
- How layered security creates comprehensive defence against modern attack methods
- Practical guidance on when your business needs these capabilities
- What to look for in MDR/ITDR solutions and providers
Who Should Attend
This webinar is designed for:
- Business Owners & Executives who need to understand modern cybersecurity without technical overwhelm
- IT Managers evaluating whether current security measures match today’s threat landscape
- Finance & Operations Leaders responsible for risk management and business continuity
- Anyone who’s wondered whether their cybersecurity is actually adequate for 2025
No technical background required. We’ll explain everything in business terms that make sense.
What You’ll Gain
By the end of this webinar, you’ll have:
✓ Clear understanding of what MDR and ITDR actually do (and why acronyms matter less than outcomes)
✓ Practical framework for evaluating whether your current security provides adequate detection and response
✓ Real-world context for how these capabilities stop attacks traditional security misses
✓ Confidence to have informed conversations about your organization’s security posture
✓ Actionable next steps for strengthening your defences without unnecessary complexity
On-Demand Webinar Replays
Catch up on our most popular training sessions, available anytime:
Webinar Replay: Decoding SMB1001. Understanding Your Cybersecurity Maturity
Cybersecurity certification doesn't have to be complex or overwhelming. Understanding SMB1001: What is SMB1001 and why it was created specifically for organisations like yours The five certification levels (Bronze to Diamond) and what each means for your organisation...
Webinar Replay: Reclaim Your Time: How Smart Microsoft 365 Use Saves 10+ Hours Per Week
Transform Daily Tasks with Microsoft 365 Tools You Already Own Stop reinventing the wheel every time you write a proposal, create a report, or process a form. Most New Zealand businesses use Microsoft 365 for email, document storage, and video calls, but they miss the...
Webinar Replay: From Firefighting to Future-Ready: Transform Your IT from Reactive Support to Strategic Business Driver
Does it seem that your IT team constantly putting out fires instead of preventing them? Are technology decisions being made in isolation without clear connection to your business goals? You're not alone. Watch this webinar recording where we'll reveal the critical...
Webinar Replay: Transform, Grow & Thrive — How Kinetics is Using AI to Boost Business Productivity
Rewatch our short webinar showcasing how Kinetics is harnessing the power of AI to elevate productivity, streamline operations, and safeguard sensitive data.Key Links: Next Events Webinar Slideshow Free AI Copilot Guide In this session, you'll discover: Real-world...
Webinar Replay: Rethinking Endpoint Security: Smarter Strategies for a Safer Business
Cyber-protection keeps getting more complex, more restrictive and more expensive. This month we are talking with expert Thomas Shobbrook. He updates us on the latest security trends and help us understand how well protected your device is out-of-the-box. We ask...
Webinar Replay – Securing the Mobile Frontier: Cybersecurity Essentials for Phones and Tablets for Modern Businesses
As mobile devices become the backbone of modern business operations, they also present a growing target for cyber threats. Apple or Android - they're both important. Every time you use these to access your Teams, Email or anything else, you are relying on them to be...
Webinar Replay: A real world guide to AI
You’ve heard the hype on how amazing AI is, and then you tried it and were… underwhelmed. Or maybe you’ve read how dangerous AI is, and so you don’t want anyone in your organisation to risk using it. So, what is the AI reality for people that work in small to medium...
Webinar Replay -Enhancing Your Security Posture with Microsoft Secure Score
This webinar replay covers the essentials of Microsoft Secure Score. Secure Score is a powerful tool designed to help businesses assess and improve their security across Microsoft 365 workloads. We will explore what Microsoft Secure Score is, why it is crucial for...
Webinar Replay – 5 mistakes people often make with passwords and how to overcome them
Passwords are the first line of defence against cyber threats. However, many people still make common mistakes that leave their accounts vulnerable. Watch this video for a 30-minute webinar where we will discuss the most frequent password pitfalls and how to avoid...








