Free IT Training Events: Expert Webinars & Workshops
To keep you informed.
Upcoming Live IT Training Events
AI Innovation Circle (Free)
Join other business managers in an honest, collaborative exploration of AI. No sales pitches. No unrealistic promises. Just real businesses sharing their genuine experiences, challenges, and solutions.
NExt Session – Thursday, 26 March 2026
Story circle format where participants share their AI journey so far, address myths and fears, and form exploration partnerships. Focus on honest discussion about what AI actually means for small businesses.
(Free) Webinar – Beyond Antivirus: Understanding MDR and ITDR for Modern Cyber Defence
Wednesday, 15 APril 2026 | 10:00-10:30 AM | Online
Your traditional security isn’t stopping today’s attacks. Here’s what will.
The Problem Every NZ Business Faces
Your business has antivirus software. You have firewalls. You’ve implemented email filtering. Yet cybercriminals are increasingly successful at bypassing these traditional defences using sophisticated techniques that don’t trigger conventional security alerts.
The uncomfortable truth? Most modern breaches happen despite having security measures in place. Attackers aren’t breaking down your doors—they’re stealing legitimate credentials and walking right through them.
Understanding Managed Detection and Response (MDR)
- Why assuming threats will get past your defences is smarter than assuming they won’t
- How continuous monitoring and expert threat hunting catch what traditional security misses
- The difference between having security tools and having someone watching them 24/7
- Real-world example: How rapid detection prevents ransomware from spreading
Understanding Identity Threat Detection and Response (ITDR)
- Why 80% of breaches now involve compromised credentials, not technical exploits
- How attackers use legitimate accounts to move through your systems undetected
- What makes identity systems uniquely vulnerable and why they need specialized protection
- The attack patterns ITDR stops: credential theft, privilege escalation, lateral movement
How These Work Together
- Why you need both environment monitoring (MDR) and identity protection (ITDR)
- How layered security creates comprehensive defence against modern attack methods
- Practical guidance on when your business needs these capabilities
- What to look for in MDR/ITDR solutions and providers
Who Should Attend
This webinar is designed for:
- Business Owners & Executives who need to understand modern cybersecurity without technical overwhelm
- IT Managers evaluating whether current security measures match today’s threat landscape
- Finance & Operations Leaders responsible for risk management and business continuity
- Anyone who’s wondered whether their cybersecurity is actually adequate for 2025
No technical background required. We’ll explain everything in business terms that make sense.
What You’ll Gain
By the end of this webinar, you’ll have:
✓ Clear understanding of what MDR and ITDR actually do (and why acronyms matter less than outcomes)
✓ Practical framework for evaluating whether your current security provides adequate detection and response
✓ Real-world context for how these capabilities stop attacks traditional security misses
✓ Confidence to have informed conversations about your organization’s security posture
✓ Actionable next steps for strengthening your defences without unnecessary complexity
On-Demand Webinar Replays
Catch up on our most popular training sessions, available anytime:
Webinar Replay: Reclaim Your Time: How Smart Microsoft 365 Use Saves 10+ Hours Per Week
Transform Daily Tasks with Microsoft 365 Tools You Already Own Stop reinventing the wheel every time you write a proposal, create a report, or process a form. Most New Zealand businesses use Microsoft 365 for email, document storage, and video calls, but they miss the...
Looking Back at 2020: The Year That Transformed Business IT Forever
Looking Back at 2020: The Year That Transformed Business IT Forever As we step into 2025, it's worth reflecting on a year that permanently altered the trajectory of business technology. Five years ago, 2020 didn't just bring new software releases and hardware...
2025 Q4: Cyber Landscape Update (are you still feeling lucky? New Zealand’s Cyber-threat landscape demands action)
Why This Brief Matters A cybercriminal only has to be lucky once. You have to be lucky every minute of every day. That remains the stark reality for kiwi businesses in Q4 2025. This isn't another dry technical report filled with acronyms and alerts. Kinetics has...
October 2025: Five AI Breakthroughs to change how businesses work
October 2025 was another big month for AI. We’ve picked 5 that stand out to us for highlighting. These five advances deserve your attention because they're already being integrated into tools your team likely uses daily. Here's what changed in October, and why it...
Beyond Anti-Virus: Understanding EDR and MDR for Your Business
"Do we have anti-virus?" It's one of the first cybersecurity questions business leaders ask. For many years, it was the right question. But in 2025, if anti-virus is your primary cybersecurity defence, you're bringing a lock and key to a sophisticated break-in. The...
Webinar Replay: From Firefighting to Future-Ready: Transform Your IT from Reactive Support to Strategic Business Driver
Does it seem that your IT team constantly putting out fires instead of preventing them? Are technology decisions being made in isolation without clear connection to your business goals? You're not alone. Watch this webinar recording where we'll reveal the critical...
SpamGPT: When AI Becomes a Phishing Playbook—And How to Protect Your Business
For years, we've told businesses to watch for telltale phishing signs: poor grammar, suspicious sender addresses, generic greetings. But what happens when cybercriminals have access to the same sophisticated AI tools your marketing team uses—except weaponised...
Training AI to Write Like You: A Strategic Guide to Developing Your Digital Voice
Your writing voice is one of your most valuable professional assets. It builds trust, conveys expertise, and creates connections with clients, colleagues, and stakeholders. But here's the challenge: as AI writing tools become essential business productivity tools, how...
AI’s Big September Moves
If you’ve been following the AI space lately, you’ll know it’s moving at a cracking pace. Just this month, xAI dropped Grok 4 Fast—a model that’s all about strong reasoning, but at a fraction of the cost. We’re talking 98% cheaper than its predecessor, Grok 4, for the...









