Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Mitigating Kubernetes risk with a GRC-centric approach

Kubernetes adoption is booming and fuelling innovation, but this agility comes with new complexities. Discover strategies to identify, prioritise and mitigate threats effectively by integrating security controls into your existing frameworks, and fostering security awareness and ownership within your teams.

Threat landscape update for 2024: Phishing, BEC, ransomware and more

Join us for a no-nonsense webinar about cybercriminals’ latest techniques, and how to stop them. Drawn from trillions of emails, attachments and URLs in Proofpoint's latest threat research, we’ll look at real-world examples of email attacks, why people still click links, and how to protect your users.

The evolution of cloud attacks: Building a modern cloud defence

The news is often filled with murky and cryptic details about breaches. But to build an effective defence strategy, we need a good understanding of how we will be attacked. Join us to learn how cloud breaches have evolved, the latest threat trends, and real techniques you can use in your defence tactics.

Influence: How does it work? How can we use it? How can we resist it?

Digital technologies have revolutionised how influence works. We can simultaneously connect with old friends and niche interest groups, but also (unwittingly) with organised criminals, terrorists and hostile states who infiltrate our societies. What can we do to protect ourselves from their influence?

See what you’re missing: Modelling your attack surface in three easy steps

System complexity is one of the biggest challenges we face today. Join us to explore the process of creating an inventory, constructing a model of your tech landscape, and elevating your security posture. You’ll learn about proactive threat detection, automated compliance analysis, and streamlined security change processes.

From telemetry to transformation: Measuring and mitigating human risk

Security awareness and training is often focused on compliance, which isn’t enough to change users’ behaviour in a sustainable way. Join us to learn about the limitations of traditional training, how to quantify cyber risk in more human terms, and how to translate risk metrics into actionable insights.

Measuring secure behaviour change: Dream or reality?

If security awareness is about driving secure behaviours, then we need to measure impact. Join us to explore why we should measure behavioural change, examine existing measures used in the industry and how flawed they can be, and learn how to set out a campaign-based approach to deliver measurable impact.

The evolution of security operations to meet future cyber regulation

The concept of effective SecOps is continually evolving and has moved beyond just having a SOC or a SIEM system. Join us to explore how your organisation can enhance security operations to not only improve your overall security maturity, but also remain compliant with existing and future regulations.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.

Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue