fbpx Webinar Library | SASIG
Forgotten your password?

All our past webinars, in one place


Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply

‘TAKEN’ - if you missed this at Big SASIG, here is another chance to see it live

"I might not have the budget, but what I do have are a particular set of services. Services that make me a nightmare for criminals who try to attack my network." Do you dream of having this conversation with the cybercriminals that attack your network? Join us to find out how to cut off attacks before they begin, without launching into Hollywood-style monologues.

Recorded on: Tuesday 6th April 2021

Button to access the recording of the webinar above

 

 

Why you need to discover your unstructured data in 2021

Do you really know what unstructured data your organisation has, or where it is stored? Not knowing is a problem if you are involved in information security as it represents massive risk and untapped value. Join us to find out why leading organisations are discovering their data and how 'knowing your data' will supercharge your own data initiatives.

Recorded on: Thursday 1st April 2021

Button to access the recording of the webinar above

 

 

EDR/NDR/XDR/WTFDR - Confused?

So were we. Come join us and learn the difference. With every vendor having a ‘Detection & Response’ story, we hope to explain the differences, remove the fog, and identify the gaps and therefore the blind spots. Is EDR/NDR really a quick fix alternative to fully functioning SIEM/SOC deployment?

Recorded on: Wednesday 31st March 2021

Button to access the recording of the webinar above

 

 

Securing those hard-to-reach areas – First choice, second opinion

Towards the end of 2020, it took an average of almost nine days for antivirus engines to recognise hashes in threats received via email. A technical second opinion can help secure your entry points. Join us to learn about some of the key use cases for Kaspersky Scan Engine and what attack vectors it can help prevent.

Recorded on: Tuesday 30th March 2021

Button to access the recording of the webinar above

 

 

Bringing military deception back into cyber defence: the UK’s National Cyber Deception Lab

The cyber threat landscape is the modern battlefield. Levels of incursion, unacceptable in any other forms of warfare, are the norm in cybersecurity. This session explores how deception provides the means to actively engage and fight the enemy in our networks and effectively defend the key terrain of our networks and data.

Recorded on: Wednesday 17th March 2021

Button to access the recording of the webinar above

 

 

How to augment your O365 security against the modern-day problem of cloud-originated ransomware attacks

Ransomware is an old threat and a modern problem. It can put victims out of business, force hospitals to turn away patients, and bring entire governments to a standstill. Cloud-originated ransomware attacks have become a proven money maker for cybercriminals, so join us to find out how you can better protect your company’s cloud environment.

Recorded on: Thursday 11th March 2021

Button to access the recording of the webinar above

 

 

Forming the UK Cyber Security Council

An introduction to the UK Cyber Security Council, which launches in April. This session will provide details on the reasons and drivers behind the Council’s formation, how the Council will operate, what the collaboration between the Council and NCSC will look like and what the expected impact on the profession will be.

Recorded on: Wednesday 10th March 2021

Button to access the recording of the webinar above

 

 

Security control assurance 101: Does it do what it says on the tin?

Security controls are powerful tools, but they can be complex and difficult to configure and manage. Despite best efforts, it’s easy to miss weaknesses that a threat actor can use to their advantage. Join us to discover what type of assurance programme you need to test existing controls and adapt configurations to eliminate blind spots.

Recorded on: Wednesday 3rd March 2021

Button to access the recording of the webinar above

 

 

The three Cs of avoiding the security heebie-jeebies

Attackers are becoming more adaptable and capable, and their ingenuity coupled with the increased threats makes a CISO’s role more complicated. Security incidents are now inevitable where complex environments and inventive attacks collide. Join us to learn why traditional approaches are no longer effective and the importance of automation in response.

Recorded on: Monday 1st March 2021

Button to access the recording of the webinar above

 

 

Dodgy data migration dangers: Four major risks and how to avoid them

Migrating data is risky. Particularly when it’s unstructured, unknown and full of sensitive information no-one knows about. Sensitive data becomes dangerous, both in transition and in the cloud, as someone can find it, whether the cloud is hybrid, public or private. There are other risks too. So join us to find out more about them and how to avoid them.

Recorded on: Thursday 4th February 2021

Button to access the recording of the webinar above

 

 

Why legacy data is the biggest barrier to data migration success (and what to do about it)

2020 was the year that saw mass migration to the cloud driven by organisations’ sudden need for digital transformation to cope with the coronavirus pandemic. But migrations can encounter problems if you don’t understand what’s in your data. Join us as we look at legacy data and why you need to clean it up before you try to migrate.

Recorded on: Wednesday 13th January 2021

Button to access the recording of the webinar above

 

 

The history of cryptography and the modern enigma of digital certificates

With 1.3 billion live and searchable websites, are you sure your internet presence is working for you? Who exactly is responsible for ensuring your internet-facing security is robust, controlled and properly managed so that your organisation is neither targeted nor infiltrated? With 30,000 websites attacked daily, can you afford to make assumptions?

Recorded on: Tuesday 15th December 2020

Button to access the recording of the webinar above

 

 

How to use information security to drive competitive advantage

The security function is a key strategic tool in driving competitive advantage for businesses. When infosec is responsible for finding and securing the data on the inside of the estate, they can mitigate the hidden risk, and unlock its value too. We explore how businesses can leverage infosec to commercialise their data and strengthen their competitive edge.

Recorded on: Monday 14th December 2020

Button to access the recording of the webinar above

 

 

A global reset: Cybersecurity predictions 2021

2020 has shaped up in a way that nobody could have expected, making it even more critical we prepare ourselves. Threat intelligence expert Dr Jamie Collier shares upcoming cyber trends and challenges. During the webinar, he will touch on remote working, threat actors, intelligence-led security validation, cloud security, nation-state activity and ransomware.

Recorded on: Tuesday 17th November 2020

Button to access the recording of the webinar above

 

 

Forestall the fireworks in your data: How to place a value on risk

There are hidden fireworks in every data estate waiting to go ‘bang’ unless they are found and remediated. Many IT professionals are worried that their organisation will be the next data breach. Yet you can’t elevate risk as a board-level business driver if it doesn’t have a value. Join us on Guy Fawkes Day as we explain how you can define value on your risk.

Recorded on: Thursday 5th November 2020

Button to access the recording of the webinar above

 

 

Cybercrime pays: The rise of ransomware, geopolitics and what it means for you

Ransomware is on the rise - there’s no doubt about that, but who is behind the attacks? And what is their motivation? Join Jared to find out as he takes us on a tour of the major nation-state players in cybercrime and unpicks their motivations and methods, as well as providing mitigations to keep your infrastructure safe - because ransomware isn’t going away.

Recorded on: Tuesday 3rd November 2020

Button to access the recording of the webinar above

 

 

How the environmental impact affects your bottom line: Things you should consider when choosing your system software

System software - such as anti-malware - may not be the obvious starting point for companies when scrutinising its potential harm to the environment, as well as the impact upon its costs. However, many independent AV testing organisations cite it as a critical consideration. We explore why that is the case and bring system software impacts into your focus.

Recorded on: Monday 2nd November 2020

Button to access the recording of the webinar above

 

 

The CISO conundrum - legacy environments – it is all about the business risk

Few organisations are immune to the effects of legacy systems, which are often business-critical in their environments. We all know how hard dealing with the standard estate is; let alone legacy, but you cannot just do nothing. We explore how to track and reassess our legacy environments to determine the process needed to make them secure.

Recorded on: Wednesday 14th October 2020

Button to access the recording of the webinar above

 

 

The establishment of the UK’s Cybersecurity Council

The session covers a history of the Cyber Security Alliance and the UK Cyber Security Council Formation Project. The Council goes live in April 2021 and will provide focus and coherence to the profession, including career and qualification pathways and a route to chartered status for individuals. The session will include a Q&A with Alliance and project members.

Recorded on: Tuesday 13th October 2020

Button to access the recording of the webinar above

 

 

The skeletons in your unstructured data

Every business faces the same problem: Not knowing what data they’ve got or where it’s stored. There are lumps and bumps under the carpet all over the place, but what do they contain? Are there skeletons that may unexpectedly come to light? We’ll share what’s in a typical organisation’s data estate and how to reduce the risk of finding any nasty surprises.

Recorded on: Thursday 1st October 2020

Button to access the recording of the webinar above

 

 

Cloud Threats from the Frontlines

Organisations have been moving to the cloud at an increasing pace. However, many are failing to protect their environments against attack effectively. This has resulted in a significant rise in cloud-related breaches by threat actors. We explore lessons learned from and share best practices for organisations protecting their cloud environments from compromise.

Recorded on: Wednesday 30th September 2020

Button to access the recording of the webinar above

 

 

Solving business email compromise and email account compromise

The rapid rise in email fraud has cost organisations globally billions of dollars, and company boards are noticing. The most recent FBI statistic cites over $26. 2billion in losses and over 166k incidents worldwide due to 'business email compromise'. But this problem impacts far more than just your email. We learn how you can protect you and your organisation.

Recorded on: Thursday 17th September 2020

Button to access the recording of the webinar above

 

 

Breaches, fines and the dangers of dark data: How to avoid becoming the next negative news story

Every month there's news of another data breach, but what are these headline-grabbing fines really for? What can we learn to avoid being next? Gareth shares Exonar's latest research into GDPR penalties, examining how these breaches happened and what could have been done to prevent them. Exonar also invites SASIG members to assist with these findings.

Recorded on: Tuesday 15th September 2020

Button to access the recording of the webinar above

 

 

Cyber Resilience for Dummies

There is no single solution offering protection from attack, but Cyber Resilience can provide a multi-layered approach encompassing people, processes and technology. Peter talks about eliminating the gap between IT and the business to present a united front against threats.

Recorded on: Friday 28th August 2020

Button to access the recording of the webinar above

 

 

The hitchhiker's guide to offensive defence: An effective way to manage digital risks

In the new cybersecurity approach of ‘Offense in Depth’, what exactly are the predictors of Exposure, Warning, and Attack indicators, as we wade through threat intelligence? We explore the value of identifying various data points in cyberspace and leveraging them to pivot from one attack attribute to another, to reduce our chances of becoming a target.

Recorded on: Wednesday 26th August 2020

Button to access the recording of the webinar above

 

 

Incident response: Hunting and detecting the latest threats

While IT teams are rushing to ensure users can work remotely, it’s business as usual for attackers. Varonis are currently seeing the highest number of VPN and Office 365 incidents ever. So join us in this session to discover what attacks are widespread right now and how you can successfully detect and respond to the latest incidents.

Recorded on: Thursday 2nd April 2020

Button to access the recording of the webinar above

 

 

This website uses cookies, by continuing to use the site you agree to using cookies. Continue