As the number and costs of cyber incidents rise, so do the insurance requirements and coverage costs. Examine key findings from a study on the current state of cyber insurance in the UK, how these results impact businesses and our sector, and recommendations for improving how cyber insurance is devised.
All our webinars, all in one place
System complexity is one of the biggest challenges we face today. Join us to explore the process of creating an inventory, constructing a model of your tech landscape, and elevating your security posture. You’ll learn about proactive threat detection, automated compliance analysis, and streamlined security change processes.
Security awareness and training is often focused on compliance, which isn’t enough to change users’ behaviour in a sustainable way. Join us to learn about the limitations of traditional training, how to quantify cyber risk in more human terms, and how to translate risk metrics into actionable insights.
If security awareness is about driving secure behaviours, then we need to measure impact. Join us to explore why we should measure behavioural change, examine existing measures used in the industry and how flawed they can be, and learn how to set out a campaign-based approach to deliver measurable impact.
The concept of effective SecOps is continually evolving and has moved beyond just having a SOC or a SIEM system. Join us to explore how your organisation can enhance security operations to not only improve your overall security maturity, but also remain compliant with existing and future regulations.
Tech organisations make great targets for cyber attackers, but the strain of protecting these firms from criminals is beginning to show, with burnout pushing many security professionals to the limit. Together, we’ll examine how burnout leads to poor decisions, reputational damage, and vulnerabilities, and we’ll share pragmatic techniques for addressing the problem.
Critical infrastructure relies on operational technology, making it a high-value target for cybercriminals. A successful attack can cause major disruption. We’ll use a real-world example to demonstrate the key principles behind OT security monitoring and how to detect and respond to unseen dangers.
The cybersecurity field has traditionally been dominated by men, but women are increasingly advancing and breaking down barriers. Join us to learn about an organisation providing a platform for women in cyber and the ways in which they are creating a community that inspires learning, networking, and positive change.
Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply