We looked back at this year’s SASIG discussions on emerging threats, AI-driven risks, regulatory and workforce demands. We’ve learned the power of innovation and resilience, but questions remain - and collaboration will be key to tackling future challenges.
All our webinars, all in one place
Dive into our extensive back catalogue, featuring over 900 webinars since the series started in 2020.
Discover a fascinating array of topics across the cybersecurity landscape. Whether you’re exploring the latest innovations, seeking expert insights or sharpening your skills, our library is your go-to resource - accessible anytime, anywhere.
Start learning and unlock the knowledge that matters to you!
When a cyber incident strikes, what happens next can make all the difference. A practical, behind-the-scenes look at incident response, where we shared what we see most often, why these incidents occur, and how organisations can prepare to respond effectively.
How can we empower people to make secure decisions without fear? This session explores the psychology of behaviour, real-time prompts, and strategies to foster awareness, reduce risks, and create lasting change. It’s time to shift from fear-based narratives to confident, proactive action.
As cyber threats evolve and regulations tighten, security leaders must move from detection to real-time risk management. This session explored how the Risk Operations Center (ROC) enables proactive, automated, and data-driven risk reduction—transforming reactive defense into measurable resilience.
Recent breaches reveal endpoint-focused security falls short as attackers exploit third-party apps and OAuth tokens. This session examined these gaps and demonstrates how behavioural analytics and timeline-driven investigation can detect threats across applications, cloud services, and users more effectively.
Many organisations are turning to AI to deliver faster email protection yet threats still get through. These tools often lack the accuracy, transparency, and adaptability needed for resilient security.
In this webinar we discovered how attackers exploit identity-based vulnerabilities to access sensitive data and bypass modern controls. We learnt how blurred lines between corporate and personal spaces enable threats and gain strategies to protect your organisation and users from these evolving attacks.
Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply