Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Navigating agentic AI: Strategies to safeguard against cyber risks

Systems that make independent automated decisions (known as agentic AI) offer immense potential, but also introduce new risks. Learn how to build a resilient cybersecurity framework when AI is both a tool and a potential threat as we explore how to leverage agentic AI for advanced cyber defences.

The real threat to underwater communications and infrastructure

More than 90% of all global digital communications and financial transactions are transmitted by undersea cables every day. But few people recognise our reliance on these unseen pipelines through which data, energy, and money flow. We discussed how we respond to the growing threats to undersea networks.

AI-Powered MDR: Proactive Threat hunting & accelerated incident response

Join us to discover how AI-powered MDR transforms security by enhancing threat hunting, accelerating incident response, and reducing alert fatigue. Learn from Rapid7’s research on how AI proactively identifies and neutralises advanced attacks, shifting your defence strategy from reactive to proactive.

Navigating the SOC landscape: Optimisation or evolution?

In today’s dynamic threat environment, organisations must decide whether to evolve their SOC incrementally or pursue a transformative overhaul. Through real-world examples, learn how to assess your security posture, balance AI-driven transformation with human expertise, and craft a roadmap to optimise your SOC.

Why traditional vulnerability management fails: Switching to risk-based

Traditional vulnerability management (VM) approaches often struggle to keep up with the evolving threat landscape due to outdated prioritisation methods and lack of context. Join us to learn about the advantages of adopting a risk-based strategy, and practical tips on how to successfully make the transition.

Navigating insider risks in an AI-driven world

Explore the evolving threat landscape of insider threats in the age of AI as we highlight how the advancements in technology amplify insider risks. You’ll learn how insider threats are evolving with AI, how AI is strengthening defences, and how to adopt proactive strategies to protect your organisation.

Emerging tech trends for 2025: Insights from Wavestone’s CISO Radar

Discover three major trends set to define the cybersecurity landscape this year and beyond, according to Wavestone’s latest research and discoveries. This insightful webinar will explore forecasts, expert input, emerging developments, and real-world analysis to help us all prepare for what’s ahead.

Dirty deployment: Nobody puts Apple in the corner - leveraging macOS telemetry

A Mac deployed without visibility is like a dance without rhythm – you are bound to miss a step. Watch now to learn how macOS telemetry ensures compliance, accelerates investigations, and enables proactive threat hunting. With the right tools, you can integrate Apple into your security strategy, because nobody should put Apple in the corner.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue