Watch now to learn proactive steps your organisation can take to fully understand your vulnerability to real world threats. You’ll see an attack simulation being set up and run, watch an assumed breach unfold, look at the difference between red teams and pen-testing, and how they actually work.
All our webinars, all in one place
Watch now to unravel the key components of a resilient supply chain and learn how identify, assess, and mitigate potential risks before they escalate into disruptions. We shared strategies, case studies, tools and actionable insights to help you navigate the risk landscape, harness data, and fortify your supply chain.
Did you know that, statistically, outages are more likely to occur due to operational misconfigurations than external actors? Explore the repercussions of seemingly minor internal changes as we highlight some substantial global outages that stemmed from inadvertent incidents rather than deliberate malicious actions.
Watch now to explore the importance of adopting a left-of-breach strategy and the critical role of securing digital identities. We’ll showcase how this comprehensive approach uses cutting-edge identity management techniques, robust multi-factor authentication, and advanced technologies to thwart your cyber adversaries.
Watch now to learn about a working group calculating greenhouse gas emissions linked to cybersecurity and developing methodologies to identify the controls with the highest emissions. We shared reduction strategies, a self-assessment tool, and insights on how you can progress your organisation’s sustainability journey.
Before ‘retiring’, Pat had a distinguished career in Royal Navy Intelligence, and was one of the first females in a senior position with PwC. She now encourages and inspires girls to consider careers in cyber. Pat believes women can make significant contributions in this field, so watch now to learn about her work.
Human error is inevitable. Cybercriminals rely on it. But by understanding the psychological causes and using good behavioural data, you can build a security response that minimises the impact. Watch now to learn why people are thought to be the weakest link, and how to reduce the ‘ID-10-T problem’.
Watch now to discover how to bring best practices into everything we and our teams do in our busy, noisy organisations, and how to measure success in ways that people care about. We’ll discuss how to ensure our organisations become good at managing change, while removing the frustrations of badly managed change.
Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply