Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Dive into our extensive back catalogue, featuring over 900 webinars since the series started in 2020.

Discover a fascinating array of topics across the cybersecurity landscape. Whether you’re exploring the latest innovations, seeking expert insights or sharpening your skills, our library is your go-to resource - accessible anytime, anywhere.

Start learning and unlock the knowledge that matters to you!

Incident Response: What Happens, Why it Happens, How to Respond

When a cyber incident strikes, what happens next can make all the difference. A practical, behind-the-scenes look at incident response, where we shared what we see most often, why these incidents occur, and how organisations can prepare to respond effectively.

Strategies for Confident Behaviour Change: Empowering Your Team

How can we empower people to make secure decisions without fear? This session explores the psychology of behaviour, real-time prompts, and strategies to foster awareness, reduce risks, and create lasting change. It’s time to shift from fear-based narratives to confident, proactive action.

Transforming the Risk Operations Centre with Agentic AI

As cyber threats evolve and regulations tighten, security leaders must move from detection to real-time risk management. This session explored how the Risk Operations Center (ROC) enables proactive, automated, and data-driven risk reduction—transforming reactive defense into measurable resilience.

The Blind Spot: When endpoint obsession leaves applications exposed

Recent breaches reveal endpoint-focused security falls short as attackers exploit third-party apps and OAuth tokens. This session examined these gaps and demonstrates how behavioural analytics and timeline-driven investigation can detect threats across applications, cloud services, and users more effectively.

Keys to the kingdom: Why identity attacks matter

In this webinar we discovered how attackers exploit identity-based vulnerabilities to access sensitive data and bypass modern controls. We learnt how blurred lines between corporate and personal spaces enable threats and gain strategies to protect your organisation and users from these evolving attacks.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue