As cyber threats evolve and regulations tighten, security leaders must move from detection to real-time risk management. This session explored how the Risk Operations Center (ROC) enables proactive, automated, and data-driven risk reduction—transforming reactive defense into measurable resilience.
All our webinars, all in one place
Regulators demand proof of compliance. This webinar explains DORA, NIS2 and HIPAA: What they are, who’s in scope, and what they require. Learn the essentials to build compliance, show evidence and avoid duplication. What steps must you take now to be compliant and audit ready?
Recent breaches reveal endpoint-focused security falls short as attackers exploit third-party apps and OAuth tokens. This session examined these gaps and demonstrates how behavioural analytics and timeline-driven investigation can detect threats across applications, cloud services, and users more effectively.
Many organisations are turning to AI to deliver faster email protection yet threats still get through. These tools often lack the accuracy, transparency, and adaptability needed for resilient security.
In this webinar we discovered how attackers exploit identity-based vulnerabilities to access sensitive data and bypass modern controls. We learnt how blurred lines between corporate and personal spaces enable threats and gain strategies to protect your organisation and users from these evolving attacks.
Learn how to drive meaningful security awareness with behavioural nudges and proven models like MINDSPACE. In this webinar, Tim explored embedding secure habits, measuring impact and proving effectiveness - Perfect for anyone looking to make security stick and engage colleagues.
AI use has exploded, but training hasn't. People are more confident, but also more vulnerable. In a world of shadow AI and deepfake scams, how do we bridge the knowledge-doing gap?
Modern Security Operations Centres are overwhelmed by alerts, tool sprawl, and evolving threats. We explored why legacy approaches no longer work and how AI and full data context can help your security teams detect smarter, respond faster, and finally regain control.
Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply