Looking to enhance your organisation's operational security with the Essential Eight framework?

Watch the free 1-hr on-demand webinar with Lumify Work (formerly DDLS Training) by completing the form on this page.

In this recorded session, our experts provide a comprehensive overview of the Essential Eight maturity model and guide you on effectively implementing them through targeted training. You'll also hear from our special guest, who specialises in assessing organisational compliance with the Australian Cyber Security Centre (ACSC) Essential Eight framework. The ACSC is part of the Australian Signals Directorate (ASD).

Featured Speakers on Essential Eight

On demand webinar speakers: Master the Essential Eight

Gary Duffield, Lumify Head of Vendor Partnerships, provides a general summary of the Essential Eight framework. Leif Pedersen, Lumify Cloud Product Manager, talks about cloud and cyber security training you can map out for each of the Essential Eight controls. Michael Hawkins of Introspectus shares insights on complying with Essential Eight assessments.

On Demand webinar placeit mockup: Master Essential Eight

Why Watch the On-Demand Session? 

The ASD Essential Eight framework was developed to help organisations defend against evolving cyber threats. Get the Essential Eight explained. Learn how it is designed to protect internet-connected IT networks by mitigating the most common and impactful security vulnerabilities.

Key topics covered

In this 1-hour session, you will:

  • Get an introduction to the Essential Eight mitigation strategies.

  • Learn how each strategy works together to provide comprehensive protection.

  • Understand common cyber threats and how the Essential Eight mitigates them.

You’ll also dive into:

  • The Eight Pillars of the framework.

  • The maturity levels for each strategy.

  • How to achieve these maturity levels in your organisation.

  • A roadmap of each Essential Eight control and how it aligns with suggested cloud and cyber security training courses.

Tailored Cyber Security Course Recommendations

Due to the wide range of systems utilised across organisations, Essential Eight has no dedicated training course. However, many of the recommended mitigation strategies align with the Microsoft ecosystem. Our training portfolio includes Microsoft Cloud Security courses, supplemented with Veeam Backup and Replication courses and fundamental cyber security audit and risk training from ISACA and ISC2.

Don't miss this opportunity to deepen your understanding of the Essential Eight. Access the on-demand webinar today by completing the form on this page.

Download Now!



Feature Articles


Blog
2024-2025 Government Budget: Focusing investment in cyber security skilling
By Jeremy Daly | 1 July 2024
Blog
The Growing Importance of Management Skills and the AMA CPM Certification in 2024
By Gary Duffield | 29 July 2024
Blog
The ASD’s Essential Eight: How to Implement Cyber Security Strategies with Training
By Leif Pedersen | 14 October 2024
Blog
5 Common RPL Challenges and How to Overcome Them
By Shanil Sharma | 15 August 2024
Blog
Transforming Your Business and Workforce with Microsoft AI Training
By Leif Pedersen | 30 July 2024
Blog
Security maturity is not a technical-only problem - invest in your people
By Jeremy Daly | 11 November 2024