On Demand: How IT Leaders Can Protect Ransomware Attacks Webinar
How IT Leaders Can Protect Ransomware Attacks
Join these ICT expert leaders from across the public sector and Macquarie Government to explore the key things every IT leader should know about what’s driving the increase of ransomware attacks, and what security strategies your department can adopt today to keep your infrastructure and data safe from future attacks. They will be breaking down a step-by-step guide to the prevention of IT related crime by first getting inside the mind of a criminal:
- Casing the joint. External Reconnaissance: How can you train your team to be aware of the risks and “lock the front and back doors?”
- Breaking in. Gaining Access: How can you restrict a hacker’s ability to escalate privileges or move laterally through your IT environment?
- Spread out, find the loot. Expanding Foothold: How do you pro-actively threat hunt to look for signs of compromise or other vulnerabilities that could be exploited?
- Blowing open the safe. Execute the attack: How can you stop hackers from reaching your “crown jewels” IT assets by putting them behind “enclaves?”
Recommendations
Transforming Compliance with Digital
INDUSTRY TRENDS
17 Dec 2025
Inside Tennessee’s Digital Future: How the State Is Redefining Procurement and IT Success in FY26
INTERVIEWS
13 Nov 2025
2025 Ransomware Holiday Risk Report
INDUSTRY TRENDS
25 Nov 2025
Let's Chat: Modernizing Workforce Accessibility and Efficiency
INTERVIEWS
20 Nov 2025
EntraGoat is a deliberately vulnerable lab that simulates real-world identity misconfigurations in Microsoft Entra ID.
GUIDES
6 Nov 2025