Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

AI-Powered MDR: Proactive Threat hunting & accelerated incident response

Join us to discover how AI-powered MDR transforms security by enhancing threat hunting, accelerating incident response, and reducing alert fatigue. Learn from Rapid7’s research on how AI proactively identifies and neutralises advanced attacks, shifting your defence strategy from reactive to proactive.

Third-party risk management – Why care and how can InfoSec help?

Third-party risk management is a critical aspect of information security. Dive into the risks associated with third parties, why they matter, and strategies for effectively mitigating them. While there's no silver-bullet solution, join us for valuable insights and practical approaches that could help you.

Navigating the SOC landscape: Optimisation or evolution?

In today’s dynamic threat environment, organisations must decide whether to evolve their SOC incrementally or pursue a transformative overhaul. Through real-world examples, learn how to assess your security posture, balance AI-driven transformation with human expertise, and craft a roadmap to optimise your SOC.

The chief’s brief with Steve Wilson, Chief AI and Product Officer, Exabeam

We learned about an award-winning pioneer in generative AI and cybersecurity, who is advancing AI-powered cyber defences. We heard about his work as the founder of the OWASP Top 10 List for LLM Applications, where he leads a global team to define the industry's guide to AI vulnerabilities, as well as his impressive track record for product design, engineering, management, and strategy.

Top tips for Active Directory defence

Gaining control of your identity systems can give threat actors near-total control of all your systems, access to sensitive data, and the means to devastate your business. Join us to learn how to survive an attack on your infrastructure, including how to improve identity security without breaking the bank.

DeepSeek - Necessity is the mother of innovation (as well)

The US government’s bipartisan effort to limit China’s access to advanced semiconductors began under Trump and escalated under Biden, aiming to curb China’s military tech and AI. However, DeepSeek’s rise challenges US AI leadership. Join our expert panel to explore its impact on the Sino-US tech race.

Why traditional vulnerability management fails: Switching to risk-based

Traditional vulnerability management (VM) approaches often struggle to keep up with the evolving threat landscape due to outdated prioritisation methods and lack of context. Join us to learn about the advantages of adopting a risk-based strategy, and practical tips on how to successfully make the transition.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue