Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

The what, why and how of implementing a Zero Trust security model

The traditional method of enforcing security at the network perimeter is no longer effective; now is the time to implement the Zero Trust security model. Watch to discover the practical benefits of Zero Trust, the importance of asset management, and practical tips to start putting Zero Trust into practice.

How to build an advanced email security strategy

Most cyberattacks still start with or involve email, so stopping threats at this stage can strengthen your entire security strategy. Learn about the latest attack techniques and how developing an advanced strategy for emails can empower you to adapt to evolving threats, reduce costs, and respond sooner.

When IT and security operations marry

For most organisations, security and IT operations work in isolation, and potentially even against each other. And yet, how the two interact makes a huge difference in how fast your organisation can mitigate issues. Learn how to unite them so they work together in harmony instead.

Applying and integrating the MITRE ATT&CK methodology

With the 4th round of the MITRE Engenuity ATT&CK out, it’s important for us to learn how the evaluation and methodology can be used in our organisations. We look at this year’s results and discover how to apply and integrate the framework into your organisation to assess and improve your cyber strategy.

Anticipate and defend against adversaries targeting SaaS and IaaS

Misconfigured APIs, over-exposed sensitive data, and shadow admins are just some of the SaaS security challenges organisations face today. Join us as we will take a deep dive into some of the most common attack scenarios and cover steps you can take to secure your SaaS and IaaS environments.

How is the cyber threat landscape shaping regulatory requirements?

We explore the crucial cyber threat developments shaping the UK’s regulatory landscape, key lessons in enhancing cyber resilience with intelligence-led security testing schemes, how Covid forced SOCs into non-compliance, and thoughts for the future of operating secure environments.

Cross-cloud hacking: Stealing Salesforce data via GitHub & Slack

Did you know an employee’s Gmail could endanger your company Salesforce data? We demonstrate how attackers exploit personal email accounts to gain access to corporate clouds and steal highly confidential customer data. Learn how the attack is performed and how to prevent cross-cloud attacks.

Crisis communication and public relations after a cybersecurity incident

However good your cyber defences are, it is still possible for them to be breached. And poor follow-up comms can compound the damage. Watch as we share case studies, go through good and poor practice, and highlight what you can do now to ensure you are prepared to respond on the day of an incident should it occur.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue