Got a question? Call 0800 835 835 | Login
Looking to enhance your organisation's operational security with the Essential Eight framework?
Watch the free 1-hr on-demand webinar with Lumify Work (formerly DDLS Training) by completing the form on this page.
In this recorded session, our experts provide a comprehensive overview of the Essential Eight maturity model and guide you on effectively implementing them through targeted training. You'll also hear from our special guest, who specialises in assessing organisational compliance with the Australian Cyber Security Centre (ACSC) Essential Eight framework. The ACSC is part of the Australian Signals Directorate (ASD).
Featured Speakers on Essential Eight
Gary Duffield, Lumify Head of Vendor Partnerships, provides a general summary of the Essential Eight framework. Leif Pedersen, Lumify Cloud Product Manager, talks about cloud and cyber security training you can map out for each of the Essential Eight controls. Michael Hawkins of Introspectus shares insights on complying with Essential Eight assessments.
Why Watch the On-Demand Session?
The ASD Essential Eight framework was developed to help organisations defend against evolving cyber threats. Get the Essential Eight explained. Learn how it is designed to protect internet-connected IT networks by mitigating the most common and impactful security vulnerabilities.
Key topics covered
In this 1-hour session, you will:
Get an introduction to the Essential Eight mitigation strategies.
Learn how each strategy works together to provide comprehensive protection.
Understand common cyber threats and how the Essential Eight mitigates them.
You’ll also dive into:
The Eight Pillars of the framework.
The maturity levels for each strategy.
How to achieve these maturity levels in your organisation.
A roadmap of each Essential Eight control and how it aligns with suggested cloud and cyber security training courses.
Tailored Cyber Security Course Recommendations
Due to the wide range of systems utilised across organisations, Essential Eight has no dedicated training course. However, many of the recommended mitigation strategies align with the Microsoft ecosystem. Our training portfolio includes Microsoft Cloud Security courses, supplemented with Veeam Backup and Replication courses and fundamental cyber security audit and risk training from ISACA and ISC2.
Don't miss this opportunity to deepen your understanding of the Essential Eight. Access the on-demand webinar today by completing the form on this page.