Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Security awareness: A framework to actually change behaviour

Security awareness is a journey to embed secure behaviours in people's daily lives. watch this webinar for practical advice, best practice, and a five-step framework that address people-based security risks by instilling effective behavioural change and building an effective cybersecurity awareness programme.

Why your security awareness isn’t working and what to do about it

Traditional approaches to security awareness aren’t resulting in behaviour change, so says the NCSC! Join us as we analyse why – through learning science and psychology. We then explore the models that can tell us what we should be doing offering actionable insights to apply in our organisations.

A CISO perspective: The convergence of internal and external cyber defence

Taking a pragmatic look at three critical components of any security program, we examine real-world examples of cyber incidents and explore how they could have been prevented. We also discuss steps you can take to improve your cyber maturity through the convergence of internal and external defences.

People-centric methods for ransomware prevention

Despite all our technical controls and security awareness training, ransomware attacks are still on the rise. It could soon become illegal to pay a ransom, making organisations more reliant on their people to stave off the worst. Take a deep dive into people-centric methods for preventing ransomware.

Why do lemons exist in the cybersecurity market and how can we avoid them?

Efficacy within cybersecurity can be poor, and continued growth in spend has not (so far) resulted in reduced overall losses. How do we increase transparency in the market so that we can avoid the duds/lemons? Watch now to hear about research with stakeholders and front-line users, and learn tips for finding peaches among the lemons.

Quick wins to identify and mitigate insider threat

Discover how augmenting existing technology to mitigate data loss through careless, compromised or malicious users could help you reduce your insider threat risk more easily than you might think. We look at enhancements you can make to your existing approaches, and how you can implement changes.

You need me to do what? 50 years of computing, comms and security

With a 54-year career, Pete has many tales to tell. Whether it was the first ISP in Brighton, painting dozens of computers bright orange, or patching a live system in hex by phone, his experiences are both unique and entertaining. This lively discussion will educate and amuse, as well as stir up fond memories.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue