Free IT Training Events: Expert Webinars & Workshops

To keep you informed.

Upcoming Live IT Training Events

(Free) Webinar – What Recent Cyber-Breaches Teach Us About Protecting Your Business

Wednesday, 18 March 2026 | 10:00-10:30 AM | Online

Learning from Others’ Mistakes: Real Cyber-Breach Insights for NZ Businesses

 Every cyber-breach tells a story—and the best way to protect your business is learning from others’ experiences before they become your own.

 Join us for a focused 30-minute session examining recent cyber-breaches affecting businesses like yours. We’ll move beyond the headlines to uncover the practical lessons that matter most for New Zealand businesses.

You’ll discover:

  • The common vulnerabilities exploited in recent major breaches
  • Warning signs that preceded these incidents—and how to spot them in your business
  • Specific, actionable steps that could have prevented each breach
  • How to assess whether similar vulnerabilities exist in your environment
  • What “reasonable security measures” actually means for insurance and compliance

This isn’t about fear—it’s about learning. We’ll translate real-world breach experiences into practical insights you can apply immediately to strengthen your business resilience.

Who should attend: Business owners, executives, and decision-makers responsible for organizational risk management.

Duration: 30 minutes 

Format: Interactive webinar with live Q&A
Register now to gain clarity on your cybersecurity journey and how to protect your organisation.

Wed, 18 Mar 2026 10:00 – 10:30 (UTC+12:00) Auckland, Wellington

AI Innovation Circle (Free)

Join other business managers in an honest, collaborative exploration of AI. No sales pitches. No unrealistic promises. Just real businesses sharing their genuine experiences, challenges, and solutions.

NExt Session – Thursday, 26 March 2026

Story circle format where participants share their AI journey so far, address myths and fears, and form exploration partnerships. Focus on honest discussion about what AI actually means for small businesses.

(Free) Webinar – Beyond Antivirus: Understanding MDR and ITDR for Modern Cyber Defence

Wednesday, 15 APril 2026 | 10:00-10:30 AM | Online

Your traditional security isn’t stopping today’s attacks. Here’s what will.

 The Problem Every NZ Business Faces

Your business has antivirus software. You have firewalls. You’ve implemented email filtering. Yet cybercriminals are increasingly successful at bypassing these traditional defences using sophisticated techniques that don’t trigger conventional security alerts.

The uncomfortable truth? Most modern breaches happen despite having security measures in place. Attackers aren’t breaking down your doors—they’re stealing legitimate credentials and walking right through them.

Understanding Managed Detection and Response (MDR)

  • Why assuming threats will get past your defences is smarter than assuming they won’t
  • How continuous monitoring and expert threat hunting catch what traditional security misses
  • The difference between having security tools and having someone watching them 24/7
  • Real-world example: How rapid detection prevents ransomware from spreading

Understanding Identity Threat Detection and Response (ITDR)

  • Why 80% of breaches now involve compromised credentials, not technical exploits
  • How attackers use legitimate accounts to move through your systems undetected
  • What makes identity systems uniquely vulnerable and why they need specialized protection
  • The attack patterns ITDR stops: credential theft, privilege escalation, lateral movement

How These Work Together

  • Why you need both environment monitoring (MDR) and identity protection (ITDR)
  • How layered security creates comprehensive defence against modern attack methods
  • Practical guidance on when your business needs these capabilities
  • What to look for in MDR/ITDR solutions and providers

Who Should Attend

This webinar is designed for:

  • Business Owners & Executives who need to understand modern cybersecurity without technical overwhelm
  • IT Managers evaluating whether current security measures match today’s threat landscape
  • Finance & Operations Leaders responsible for risk management and business continuity
  • Anyone who’s wondered whether their cybersecurity is actually adequate for 2025

No technical background required. We’ll explain everything in business terms that make sense.

What You’ll Gain

By the end of this webinar, you’ll have:

✓ Clear understanding of what MDR and ITDR actually do (and why acronyms matter less than outcomes)

✓ Practical framework for evaluating whether your current security provides adequate detection and response

✓ Real-world context for how these capabilities stop attacks traditional security misses

✓ Confidence to have informed conversations about your organization’s security posture

✓ Actionable next steps for strengthening your defences without unnecessary complexity

On-Demand Webinar Replays

Catch up on our most popular training sessions, available anytime:

 

Keeping up with Microsoft 365 and Office

Keeping up with Microsoft 365 and Office

Microsoft have added a stack of new capabilities to Office in just the last six months. Because they just appear, it's easy to miss them, and some of these new features are really useful. How many of these new Office features did you know about? 1. Insert Pictures in...

AI Introduction: Free Self-Paced Learning

AI Introduction: Free Self-Paced Learning

We've been exploring AI for a while now.   Regular readers have shared the journey with us to uncover practical AI for everyday use. AI isn't science fiction.  We've been seeing it for a while now and now Microsoft (and others) have made it mainstream. AI's been in...

Webinar Replay : Learn How to Protect Yourself from the Darkweb Now

Webinar Replay : Learn How to Protect Yourself from the Darkweb Now

What does it mean If your personal details are leaked on the darkweb?   Learn how you can manage your risks.The darkweb is a network of websites and servers that are not indexed by traditional search engines and require special software to access. It's a place where...