Our networks can be so complex that identifying areas of risk is almost impossible. Seeing (and understanding) your attack surface is critical to a successful security strategy. Discover how a working model of your network could help you supercharge security, simplify compliance, and change processes.
All our webinars, all in one place
Can you confidently navigate SaaS? Since providers often lack backup and recovery options, your valuable data can be left vulnerable – a critical gap in your data protection responsibilities. Join this webinar to explore strategies and solutions for robust compliance and resilience in the evolving SaaS landscape.
Regulatory information is often strewn across multiple bodies and locked up in PDFs, leaving both people and machines struggling to access the required materials. We’ll discuss the key ways regulators could help us achieve our shared goal of effective compliance, and make their rules easier to find, use, and update.
Just as people only notice cybersecurity when an attack happens, they only notice inclusion when they feel excluded. Discover the challenges for leaders trying to understand the impact of exclusion, share instances that cause women to feel excluded, and help mobilise (not paralyse) advocacy in action.
With the enforcement date fast approaching, we must all prepare for NIS2’s enhanced cybersecurity standards. We’ll demystify the directive to help you understand your new obligations, particularly around incident response and supply chain management, and give you actionable insights for readiness.
Discover why a shift-left approach is not enough and how adopting a comprehensive cloud security strategy can better protect your enterprise against evolving threats. This webinar is aimed at security analysts and enterprise leaders looking to stay ahead in the cloud and runtime security game.
We are hugely privileged to hear about Eliot’s fascinating career in journalism and international affairs. We’ll hear stories which will make clear why he has been awarded prizes for excellence in journalism, freedom of speech, and innovative contributions to peace and human rights, as well as what he’s learnt from working with OSINT.
The four core enemies of cybersecurity are volatility, uncertainty, complexity, and ambiguity. Join us to learn about their impact on resilience, and for actionable insights on using threat intelligence to actively combat them. We’ll also get an exclusive first look at findings from a 2024/25 report.
Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply