Free IT Training Events: Expert Webinars & Workshops
To keep you informed.
Upcoming Live IT Training Events
AI Innovation Circle (Free)
Join other business managers in an honest, collaborative exploration of AI. No sales pitches. No unrealistic promises. Just real businesses sharing their genuine experiences, challenges, and solutions.
NExt Session – Thursday, 26 March 2026
Story circle format where participants share their AI journey so far, address myths and fears, and form exploration partnerships. Focus on honest discussion about what AI actually means for small businesses.
(Free) Webinar – Beyond Antivirus: Understanding MDR and ITDR for Modern Cyber Defence
Wednesday, 15 APril 2026 | 10:00-10:30 AM | Online
Your traditional security isn’t stopping today’s attacks. Here’s what will.
The Problem Every NZ Business Faces
Your business has antivirus software. You have firewalls. You’ve implemented email filtering. Yet cybercriminals are increasingly successful at bypassing these traditional defences using sophisticated techniques that don’t trigger conventional security alerts.
The uncomfortable truth? Most modern breaches happen despite having security measures in place. Attackers aren’t breaking down your doors—they’re stealing legitimate credentials and walking right through them.
Understanding Managed Detection and Response (MDR)
- Why assuming threats will get past your defences is smarter than assuming they won’t
- How continuous monitoring and expert threat hunting catch what traditional security misses
- The difference between having security tools and having someone watching them 24/7
- Real-world example: How rapid detection prevents ransomware from spreading
Understanding Identity Threat Detection and Response (ITDR)
- Why 80% of breaches now involve compromised credentials, not technical exploits
- How attackers use legitimate accounts to move through your systems undetected
- What makes identity systems uniquely vulnerable and why they need specialized protection
- The attack patterns ITDR stops: credential theft, privilege escalation, lateral movement
How These Work Together
- Why you need both environment monitoring (MDR) and identity protection (ITDR)
- How layered security creates comprehensive defence against modern attack methods
- Practical guidance on when your business needs these capabilities
- What to look for in MDR/ITDR solutions and providers
Who Should Attend
This webinar is designed for:
- Business Owners & Executives who need to understand modern cybersecurity without technical overwhelm
- IT Managers evaluating whether current security measures match today’s threat landscape
- Finance & Operations Leaders responsible for risk management and business continuity
- Anyone who’s wondered whether their cybersecurity is actually adequate for 2025
No technical background required. We’ll explain everything in business terms that make sense.
What You’ll Gain
By the end of this webinar, you’ll have:
✓ Clear understanding of what MDR and ITDR actually do (and why acronyms matter less than outcomes)
✓ Practical framework for evaluating whether your current security provides adequate detection and response
✓ Real-world context for how these capabilities stop attacks traditional security misses
✓ Confidence to have informed conversations about your organization’s security posture
✓ Actionable next steps for strengthening your defences without unnecessary complexity
On-Demand Webinar Replays
Catch up on our most popular training sessions, available anytime:
AI’s big stories over summer
A month is a long time in the world of AI, so we thought we’d share some of the AI news highlights. Deepseek The big highlight has to be the emergence of Deepseek. Whether it builds on OpenAi and others, or whether it is entirely new is being wrangled over, but the...
Where do you think AI will take us in 2025? Do your picks match ours?
Artificial Intelligence has been the IT and business topic of 2024. “What’s next, how can we use it, should we be afraid of it” have been the big questions. Now we’re in a new year, and what are the new trends we need to ready for?
TEN things the government says you need to know about your cyber-security defence
Regular readers will be a little tired of hearing us talk about cyber-risk and the threat of hackers. You'll forgive us a little because we see the impact when events happen, and we spend our days protecting our clients to keep them safe. But we're just a tiny cog...
Not loving the new Outlook?
Microsoft have been pushing out a new version of Outlook for a while now. You’ve seen the toggle offering the chance to trial it. It seems to be an acquired taste and we’ve seen a few people revert to the old ‘classic’ version. Microsoft have been encouraging us to...
What do Microsoft’s Upcoming 2025 Security Enhancements for Windows mean for you?
In response to the significant CrowdStrike meltdown last summer, which exposed some critical vulnerabilities in the Windows platform, Microsoft is set to introduce a series of further security updates in 2025. The meltdown, caused by a flawed update, led to widespread...
Webinar Replay: Practical AI – Turning your 365 data into a Copilot AI resource
Webinar - Practical AI - Turning your 365 data into a Copilot AI resource Harness the power of your data to achieve effective AI outcomes.Webinar Recap: Introduction: Scott Fennell welcomed attendees and introduced the webinar's focus on Microsoft Copilot and AI...
The End of an Era: Windows 10 Support is Ending – What You Need to Know.
October 14, 2025 marks the end of support for Windows 10. That’s a bit of a milestone. Windows 10 has been a reliable companion on our PCs at home and work for years. However, as with all good things, this era is coming to an end. So, what does this mean for you if...
Is your MS Teams vulnerable to this new hacker threat?
It has taken a while, but hackers have now figured out that they can target users via Teams chat. There are legitimate reasons to chat with external parties, but, as with all forms of digital communication, you need to be alert.CyberThreat Summary Researchers at...
Why most business IT projects fail – Don’t miss this crucial step.
There is one IT project factor that is overlooked all too often and it is costing businesses more than they realise. Implementing AI tools like Microsoft’s 365 Copilot might seem like a quick win for improving productivity, but without effective change management,...









