The traditional method of enforcing security at the network perimeter is no longer effective; now is the time to implement the Zero Trust security model. Watch to discover the practical benefits of Zero Trust, the importance of asset management, and practical tips to start putting Zero Trust into practice.
All our webinars, all in one place
Most cyberattacks still start with or involve email, so stopping threats at this stage can strengthen your entire security strategy. Learn about the latest attack techniques and how developing an advanced strategy for emails can empower you to adapt to evolving threats, reduce costs, and respond sooner.
Security awareness and training has been stagnant for too long. Mercifully, transformational security teams are realising the old ways of approaching the human element aren’t working. We uncover and discuss how to truly manage human cyber risk at work, and share takeaway tips, tricks and pitfalls.
With over 20,000 new vulnerabilities published last year alone, how do you prioritise them? Discover how a network model of your infrastructure can put threats into the context of your environment and help you prioritise what needs to be taken care of right away, and what can wait.
For most organisations, security and IT operations work in isolation, and potentially even against each other. And yet, how the two interact makes a huge difference in how fast your organisation can mitigate issues. Learn how to unite them so they work together in harmony instead.
With the 4th round of the MITRE Engenuity ATT&CK out, it’s important for us to learn how the evaluation and methodology can be used in our organisations. We look at this year’s results and discover how to apply and integrate the framework into your organisation to assess and improve your cyber strategy.
Data’s enormous commerce potential puts it at significant risk of abuse. Join us as we consider the governance that directs our organisations and risk alignments, and what influences that governance. Is it regulations, the industry, ethics, or culture? Plus, how can we ensure the board understand the risks, too? This is the first of two parts. You can register for the second session at www.thesasig.com/calendar/event/22-07-01-risk
Misconfigured APIs, over-exposed sensitive data, and shadow admins are just some of the SaaS security challenges organisations face today. Join us as we will take a deep dive into some of the most common attack scenarios and cover steps you can take to secure your SaaS and IaaS environments.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply