Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Where is cyber insurance now? A whitepaper review

As the number and costs of cyber incidents rise, so do the insurance requirements and coverage costs. Examine key findings from a study on the current state of cyber insurance in the UK, how these results impact businesses and our sector, and recommendations for improving how cyber insurance is devised.

See what you’re missing: Modelling your attack surface in three easy steps

System complexity is one of the biggest challenges we face today. Join us to explore the process of creating an inventory, constructing a model of your tech landscape, and elevating your security posture. You’ll learn about proactive threat detection, automated compliance analysis, and streamlined security change processes.

From telemetry to transformation: Measuring and mitigating human risk

Security awareness and training is often focused on compliance, which isn’t enough to change users’ behaviour in a sustainable way. Join us to learn about the limitations of traditional training, how to quantify cyber risk in more human terms, and how to translate risk metrics into actionable insights.

Measuring secure behaviour change: Dream or reality?

If security awareness is about driving secure behaviours, then we need to measure impact. Join us to explore why we should measure behavioural change, examine existing measures used in the industry and how flawed they can be, and learn how to set out a campaign-based approach to deliver measurable impact.

The evolution of security operations to meet future cyber regulation

The concept of effective SecOps is continually evolving and has moved beyond just having a SOC or a SIEM system. Join us to explore how your organisation can enhance security operations to not only improve your overall security maturity, but also remain compliant with existing and future regulations.

Combating burnout to protect both your data and your ethics

Tech organisations make great targets for cyber attackers, but the strain of protecting these firms from criminals is beginning to show, with burnout pushing many security professionals to the limit. Together, we’ll examine how burnout leads to poor decisions, reputational damage, and vulnerabilities, and we’ll share pragmatic techniques for addressing the problem.

Operational Technology: The latest battlefield in the ongoing cyber war

Critical infrastructure relies on operational technology, making it a high-value target for cybercriminals. A successful attack can cause major disruption. We’ll use a real-world example to demonstrate the key principles behind OT security monitoring and how to detect and respond to unseen dangers.

CyberWomen Groups: Empowering tomorrow's leaders in cyber-based roles

The cybersecurity field has traditionally been dominated by men, but women are increasingly advancing and breaking down barriers. Join us to learn about an organisation providing a platform for women in cyber and the ways in which they are creating a community that inspires learning, networking, and positive change.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue