This event is now complete

Two Decades On: Rethinking Active Directory Defence for a High-Threat Era
Partner logo

Two Decades On: Rethinking Active Directory Defence for a High-Threat Era

6 Aug 2025 Webinar 11:00 AM - 12:00 PM AEST

Proudly supported by

Proudly supported logo

Event overview

For over 20 years, Active Directory has been the foundation of identity management across the public sector. But as government agencies face increasingly sophisticated cyber threats and rising regulatory obligations—including privacy law reforms and the evolving guidance from the Australian Signals Directorate (ASD)—traditional approaches to AD protection are no longer enough.

This webinar brings together senior IT and security leaders to explore how governments can modernise identity protection strategies across hybrid, on-premises and cloud environments. With operational continuity, critical infrastructure protection and citizen trust on the line, it’s time to elevate AD defence from reactive recovery to proactive risk prevention.

Key topics will include:

  • What “modern defence” really means for Active Directory in a post-ransomware, zero-trust environment
  • How to apply ASD Essential Eight, IRAP controls and identity-specific recommendations at scale
  • Streamlining incident response and audit-readiness with advanced AD recovery and change monitoring
  • Minimising service disruption and data loss through secure, tested recovery frameworks
  • Enabling visibility and accountability across increasingly complex identity ecosystems

This is a critical conversation for CIOs, CISOs, infrastructure leaders and directors responsible for safeguarding government systems, data and services. Attendees will walk away with actionable insights to strengthen identity resilience and prepare for what’s next in cyber defence.

Register for FREE - and get year-round access to colleagues, community, and content

Why Attend?

Strengthen your agency’s identity resilience

Gain practical strategies for safeguarding Active Directory across hybrid and cloud environments—aligned with ASD guidance, IRAP requirements and privacy reforms.

Reduce risk and disruption before it happens

Learn how to move beyond reactive recovery and embed proactive protection and rapid restoration into your critical systems.

Stay ahead of compliance and cyber threats

Explore how advanced AD monitoring, recovery and visibility tools can support audit-readiness, continuity planning and Zero Trust maturity.

Questions?

See our FAQs or get in touch