Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

AI-Powered MDR: Proactive Threat hunting & accelerated incident response

Join us to discover how AI-powered MDR transforms security by enhancing threat hunting, accelerating incident response, and reducing alert fatigue. Learn from Rapid7’s research on how AI proactively identifies and neutralises advanced attacks, shifting your defence strategy from reactive to proactive.

Navigating the SOC landscape: Optimisation or evolution?

In today’s dynamic threat environment, organisations must decide whether to evolve their SOC incrementally or pursue a transformative overhaul. Through real-world examples, learn how to assess your security posture, balance AI-driven transformation with human expertise, and craft a roadmap to optimise your SOC.

Why traditional vulnerability management fails: Switching to risk-based

Traditional vulnerability management (VM) approaches often struggle to keep up with the evolving threat landscape due to outdated prioritisation methods and lack of context. Join us to learn about the advantages of adopting a risk-based strategy, and practical tips on how to successfully make the transition.

Navigating insider risks in an AI-driven world

Explore the evolving threat landscape of insider threats in the age of AI as we highlight how the advancements in technology amplify insider risks. You’ll learn how insider threats are evolving with AI, how AI is strengthening defences, and how to adopt proactive strategies to protect your organisation.

Emerging tech trends for 2025: Insights from Wavestone’s CISO Radar

Discover three major trends set to define the cybersecurity landscape this year and beyond, according to Wavestone’s latest research and discoveries. This insightful webinar will explore forecasts, expert input, emerging developments, and real-world analysis to help us all prepare for what’s ahead.

Dirty deployment: Nobody puts Apple in the corner - leveraging macOS telemetry

A Mac deployed without visibility is like a dance without rhythm – you are bound to miss a step. Watch now to learn how macOS telemetry ensures compliance, accelerates investigations, and enables proactive threat hunting. With the right tools, you can integrate Apple into your security strategy, because nobody should put Apple in the corner.

Proactive cyber resilience: Stopping threats before they ignite

Explore why breaches happen and how to respond faster with advanced disruption techniques and automation. We’ll provide actionable insights on detection, disruption and containment, minimising damage, and continuous improvement. Make your organisation too costly a target for attackers to bother with.

The butterfly effect: Hidden costs of network security policy management

More than 50% of security professionals' time is reportedly spent on routine tasks. But when even a minor misconfiguration can trigger far-reaching consequences, this creates constant risk. Automation can streamline processes, reduce risk, and free teams up to focus on strategic activities – just like in the films!

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue