Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Unlocking business growth: Secrets to cybersecurity success

In this session, Tim will provide first-hand case study examples of effective cyber positioning in action, leave you with valuable takeaway actions to implement, and demonstrate how cybersecurity is more than just a proactive measure - it's a business growth asset.

Exploiting large language models (LLMs): A new age in offensive security

Any sufficiently advanced technology can be used for both benevolent and malicious purposes. We’ll explore how LLMs have moved beyond deep fakes for our use in offensive security, such as phishing pretext generation, as well as examining some of the attacks against LLMs that could be exposing your business.

Ignore policy management at your peril: Managing policy to engage your staff

Join us to explore the current state of policy management, why staff don’t read policies, and practical ways to improve how you update and communicate your policies. You’ll also learn how to leverage cutting-edge technologies, including AI and short-form videos, to enhance administration and engagement.

How generative AI will affect your supply chain security

OpenAI's popular ChatGPT now influences most industries. Adoption ranges from informed integration to indirect use through other systems, bringing both opportunities and cybersecurity risks. Watch now as we addressed generative AI's impact on supply chain security and provided actionable risk mitigation recommendations.

SASIG IoT Academy Session 4: The future of IoT

There is massive potential for IoT technology to radically impact and improve our lives as the information age comes to full fruition, so long as we’re prepared. In this final session of the series, we look at the future of IoT, what we can achieve with it, and how we can prepare for the security challenge it poses.

SASIG IoT Academy Session 3: What can we learn from the OT world?

While it’s fair to say that the cybersecurity of operational technology (OT) is not near the maturity of enterprise IT, it’s far beyond that of the IoT world. In this session we examine how we secure OT systems to see what lessons can be learned and applied to IoT devices and networks in the future.

SASIG IoT Academy Session 2: IoT; the threat it poses and how to secure it

With the prevalence of IoT devices, how do we take on the mammoth challenge of identifying and securing the devices on our networks? Join us to learn how bad actors can use IoT devices to gain access to your network, how to apply ringfencing principles to IoT devices, and how to identify shadow devices with AI techniques.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.

Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue