Cyber security webinars
Me pēhea te whakapakari ake i tō haumarutanga ipurangi
In 2024 the Cyber Security for the Tertiary Sector initiative facilitated online webinars to help organisations in the New Zealand tertiary education sector to better understand cyber security and help them decide what steps they can take to become more secure.
In 2024 the Cyber Security for the Tertiary Sector initiative facilitated online webinars to help organisations in the New Zealand tertiary education sector to better understand cyber security and help them decide what steps they can take to become more secure.
The cyber security webinars, facilitated by Defend, were well attended and informative. Recordings of these sessions are below.
Recordings of webinars
Title | Overview |
---|---|
Learn about the different kinds of phishing, how to spot a phish and what to do when phished. |
|
Learn the biggest threats to the tertiary sector, how hackers get in, and what you can do to keep your organisation and yourself safe. |
|
Learn about what data to protect and how to keep data safe. |
|
Learn how to use conditional access, muti-factor authentication, Azure Identity Protection and Zero Trust Principles to reduce the likelihood of accounts being compromised. |
|
Find out about the different methods that threat actors use to manipulate you to do the hard work for them. |
|
Learn more about different kinds of authentication, what makes a bad or good password, multi factor authentication (MFA) and new developments. |
Additional educational videos and content from Microsoft
These workshops, run by Microsoft, provide targeted information on what to do to make your organisation more cyber secure. They are primarily aimed at tertiary education organisations (TEOs) with access to E5/A5 Microsoft licensing. We’ve outlined the groups most likely to benefit from the workshops, below:
Title | Overview | Links |
Most likely to benefit |
---|---|---|---|
Security Foundations |
Setting the stage for Zero Trust, MFA and the basics on Identity based protection and why. |
Understanding and Getting Started with ZERO TRUST – YouTube, 57mins |
IT professionals, security admins, identity, and access admins, CISOs, security managers. |
CISO and Cloud Security Architectures - MCRA |
The Chief Information Security Officer (CISO) training helps accelerate security program modernisation with reference to strategies built using Zero Trust principles. Modular videos cover strategic initiatives, roles and responsibilities, success metrics, maturity models and more. |
Individual CISO Workshop Videos – Microsoft MCRA playlist explaining each key topic in the MCRA – YouTube |
Security and risk managers, CISOs, IT managers. |
M365 Security |
What do we get with M365 Security? An overview of what is available and what you need to plan to implement as a baseline. |
Video on using Defender M365 – YouTube |
IT professionals, security admins, identity and access admins, IT developers. |
Cloud and Hybrid Security |
Using Defender for Cloud to manage your multi cloud security requirements. |
Video introducing Defender for Cloud – YouTube Full playlist for Defender for Cloud – YouTube Defender for Cloud helps you simplify your cloud security management and improve your security outcomes. Learn more at: Defender for Cloud – Microsoft. |
IT professionals, security admins, identity and access admins, IT developers. |