Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

The SASIG Supporter Showcase (part 2)

Whether you want to discover the latest updates from leaders in the cybersecurity industry or are curious what we mean by 'Supporters', watch now and meet the organisations who help make SASIG possible. This is a fantastic opportunity to learn more about the companies that support SASIG and how they could help you – with no marketing noise or aggressive sales techniques.

The SASIG Supporter Showcase (part 1)

Whether you want to discover the latest updates from leaders in the cybersecurity industry or are curious what we mean by 'Supporters', watch this recording to discover some of the organisations who help make SASIG possible. This is a fantastic opportunity to learn more about the companies that support SASIG and how they could help you – with no marketing noise or aggressive sales techniques.

Phishing simulations: Should we really send mock emails to our colleagues?

Phishing simulations is a controversial subject, so we want to talk about it! What do we hope to achieve from sending ‘test’ emails? What do we do with those who ‘pass’ or ‘fail’? Is there a better option? Watch this webinar to hear disaster and success stories, and learn from the experts.

Enhancing the user experience: What it means, and why it matters

The last few years have taught us the importance of connections – not just between people, but between users and their technology. SLAs can no longer be the sole measure of IT success, so let’s put the humanity back into our tech-driven world. Watch this webinar to learn why enhancing the user experience is so important.

The secret life of Teams: What really happens behind the scenes

Varonis walked us through the common challenges seen in the field, demonstrated how powerful collaboration features in M365 often result in complexity and pain for IT security, and showed us what truly happens under the hood when users share data in different ways.

UK supply chains: Demanding higher security standards in supplier contracts

More interconnected digital supply chains mean amplified cyber risks. But do supplier contracts always represent a business' risk posture? If not, where can government offer support? DCMS joined us and invited feedback on this area, while explaining how to demand the right level of security in your contracts.

Every cloud has an unsecure lining

Our widespread adoption of cloud-services and need to share knowledge rapidly provides endless opportunities for information to end up in the wrong hands. Watch as we assess the common issues, share how to educate your organisation, and look at OSINT techniques for red-teamers and bug-bounty hunters.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue