Looking to enhance your organisation's operational security with the Essential Eight framework?

Watch the free 1-hr on-demand webinar with Lumify Work (formerly DDLS Training) by completing the form on this page.

In this recorded session, our experts provide a comprehensive overview of the Essential Eight maturity model and guide you on effectively implementing them through targeted training. You'll also hear from our special guest, who specialises in assessing organisational compliance with the Australian Cyber Security Centre (ACSC) Essential Eight framework. The ACSC is part of the Australian Signals Directorate (ASD).

Featured Speakers on Essential Eight

On demand webinar speakers: Master the Essential Eight

Gary Duffield, Lumify Head of Vendor Partnerships, provides a general summary of the Essential Eight framework. Leif Pedersen, Lumify Cloud Product Manager, talks about cloud and cyber security training you can map out for each of the Essential Eight controls. Michael Hawkins of Introspectus shares insights on complying with Essential Eight assessments.

On Demand webinar placeit mockup: Master Essential Eight

Why Watch the On-Demand Session? 

The ASD Essential Eight framework was developed to help organisations defend against evolving cyber threats. Get the Essential Eight explained. Learn how it is designed to protect internet-connected IT networks by mitigating the most common and impactful security vulnerabilities.

Key topics covered

In this 1-hour session, you will:

  • Get an introduction to the Essential Eight mitigation strategies.

  • Learn how each strategy works together to provide comprehensive protection.

  • Understand common cyber threats and how the Essential Eight mitigates them.

You’ll also dive into:

  • The Eight Pillars of the framework.

  • The maturity levels for each strategy.

  • How to achieve these maturity levels in your organisation.

  • A roadmap of each Essential Eight control and how it aligns with suggested cloud and cyber security training courses.

Tailored Cyber Security Course Recommendations

Due to the wide range of systems utilised across organisations, Essential Eight has no dedicated training course. However, many of the recommended mitigation strategies align with the Microsoft ecosystem. Our training portfolio includes Microsoft Cloud Security courses, supplemented with Veeam Backup and Replication courses and fundamental cyber security audit and risk training from ISACA and ISC2.

Don't miss this opportunity to deepen your understanding of the Essential Eight. Access the on-demand webinar today by completing the form on this page.

Download Now!



Feature Articles


Blog
Understanding PRINCE2 Version 6 vs 7: Themes, risks & issue management
By Fred Carenese | 21 May 2024
Blog
The Growing Importance of Management Skills and the AMA CPM Certification in 2024
By Gary Duffield | 29 July 2024
Blog
Transforming Your Business and Workforce with Microsoft AI Training
By Leif Pedersen | 30 July 2024
Blog
CGEIT Training & Certification: Aligning IT with Business Objectives
By Jeremy Daly | 22 May 2024
Blog
CDPSE Certification: Bridging the Gap Between Privacy and Technology
By Jeremy Daly | 24 May 2024