Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Combating burnout to protect both your data and your ethics

Tech organisations make great targets for cyber attackers, but the strain of protecting these firms from criminals is beginning to show, with burnout pushing many security professionals to the limit. Together, we’ll examine how burnout leads to poor decisions, reputational damage, and vulnerabilities, and we’ll share pragmatic techniques for addressing the problem.

Operational Technology: The latest battlefield in the ongoing cyber war

Critical infrastructure relies on operational technology, making it a high-value target for cybercriminals. A successful attack can cause major disruption. We’ll use a real-world example to demonstrate the key principles behind OT security monitoring and how to detect and respond to unseen dangers.

CyberWomen Groups: Empowering tomorrow's leaders in cyber-based roles

The cybersecurity field has traditionally been dominated by men, but women are increasingly advancing and breaking down barriers. Join us to learn about an organisation providing a platform for women in cyber and the ways in which they are creating a community that inspires learning, networking, and positive change.

A CISO's vision of cloud security

Enhance your cloud security expertise with this insightful webinar on securing hybrid cloud environments in an increasingly connected world. We gave a high-level overview, discussed the differences between cloud environments, explored best practices for mitigating risks, and offered practical guidance.

The chief’s brief with Phil Huggins, National CISO for Health and Social Care, NHS England

Phil is an experienced security leader with a history in CNI, sensitive government, global financial services, and national regulators. In his current role, Phil sets system cyber policy, strategy, and architecture for the NHS, the DHSC, and social care providers, as well as acting as a NIS regulator and leading on national cyber incidents. We’re privileged to hear about Phil’s career and experiences.

Cyber insights: An insider view of red teaming and pen-testing

Watch now to learn proactive steps your organisation can take to fully understand your vulnerability to real world threats. You’ll see an attack simulation being set up and run, watch an assumed breach unfold, look at the difference between red teams and pen-testing, and how they actually work.

Data-driven defence: Fortifying supply chains with proactive risk management

Watch now to unravel the key components of a resilient supply chain and learn how identify, assess, and mitigate potential risks before they escalate into disruptions. We shared strategies, case studies, tools and actionable insights to help you navigate the risk landscape, harness data, and fortify your supply chain.

Operational resilience: Protecting against accidental incidents

Did you know that, statistically, outages are more likely to occur due to operational misconfigurations than external actors? Explore the repercussions of seemingly minor internal changes as we highlight some substantial global outages that stemmed from inadvertent incidents rather than deliberate malicious actions.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue