Tech organisations make great targets for cyber attackers, but the strain of protecting these firms from criminals is beginning to show, with burnout pushing many security professionals to the limit. Together, we’ll examine how burnout leads to poor decisions, reputational damage, and vulnerabilities, and we’ll share pragmatic techniques for addressing the problem.
All our webinars, all in one place
Critical infrastructure relies on operational technology, making it a high-value target for cybercriminals. A successful attack can cause major disruption. We’ll use a real-world example to demonstrate the key principles behind OT security monitoring and how to detect and respond to unseen dangers.
The cybersecurity field has traditionally been dominated by men, but women are increasingly advancing and breaking down barriers. Join us to learn about an organisation providing a platform for women in cyber and the ways in which they are creating a community that inspires learning, networking, and positive change.
Enhance your cloud security expertise with this insightful webinar on securing hybrid cloud environments in an increasingly connected world. We gave a high-level overview, discussed the differences between cloud environments, explored best practices for mitigating risks, and offered practical guidance.
Phil is an experienced security leader with a history in CNI, sensitive government, global financial services, and national regulators. In his current role, Phil sets system cyber policy, strategy, and architecture for the NHS, the DHSC, and social care providers, as well as acting as a NIS regulator and leading on national cyber incidents. We’re privileged to hear about Phil’s career and experiences.
Watch now to learn proactive steps your organisation can take to fully understand your vulnerability to real world threats. You’ll see an attack simulation being set up and run, watch an assumed breach unfold, look at the difference between red teams and pen-testing, and how they actually work.
Watch now to unravel the key components of a resilient supply chain and learn how identify, assess, and mitigate potential risks before they escalate into disruptions. We shared strategies, case studies, tools and actionable insights to help you navigate the risk landscape, harness data, and fortify your supply chain.
Did you know that, statistically, outages are more likely to occur due to operational misconfigurations than external actors? Explore the repercussions of seemingly minor internal changes as we highlight some substantial global outages that stemmed from inadvertent incidents rather than deliberate malicious actions.
Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply