Systems that make independent automated decisions (known as agentic AI) offer immense potential, but also introduce new risks. Learn how to build a resilient cybersecurity framework when AI is both a tool and a potential threat as we explore how to leverage agentic AI for advanced cyber defences.
All our webinars, all in one place
More than 90% of all global digital communications and financial transactions are transmitted by undersea cables every day. But few people recognise our reliance on these unseen pipelines through which data, energy, and money flow. We discussed how we respond to the growing threats to undersea networks.
Join us to discover how AI-powered MDR transforms security by enhancing threat hunting, accelerating incident response, and reducing alert fatigue. Learn from Rapid7’s research on how AI proactively identifies and neutralises advanced attacks, shifting your defence strategy from reactive to proactive.
In today’s dynamic threat environment, organisations must decide whether to evolve their SOC incrementally or pursue a transformative overhaul. Through real-world examples, learn how to assess your security posture, balance AI-driven transformation with human expertise, and craft a roadmap to optimise your SOC.
Traditional vulnerability management (VM) approaches often struggle to keep up with the evolving threat landscape due to outdated prioritisation methods and lack of context. Join us to learn about the advantages of adopting a risk-based strategy, and practical tips on how to successfully make the transition.
Explore the evolving threat landscape of insider threats in the age of AI as we highlight how the advancements in technology amplify insider risks. You’ll learn how insider threats are evolving with AI, how AI is strengthening defences, and how to adopt proactive strategies to protect your organisation.
Discover three major trends set to define the cybersecurity landscape this year and beyond, according to Wavestone’s latest research and discoveries. This insightful webinar will explore forecasts, expert input, emerging developments, and real-world analysis to help us all prepare for what’s ahead.
A Mac deployed without visibility is like a dance without rhythm – you are bound to miss a step. Watch now to learn how macOS telemetry ensures compliance, accelerates investigations, and enables proactive threat hunting. With the right tools, you can integrate Apple into your security strategy, because nobody should put Apple in the corner.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply