Whether you want to discover the latest updates from leaders in the cybersecurity industry or are curious what we mean by 'Supporters', watch now and meet the organisations who help make SASIG possible. This is a fantastic opportunity to learn more about the companies that support SASIG and how they could help you – with no marketing noise or aggressive sales techniques.
All our webinars, all in one place
Whether you want to discover the latest updates from leaders in the cybersecurity industry or are curious what we mean by 'Supporters', watch this recording to discover some of the organisations who help make SASIG possible. This is a fantastic opportunity to learn more about the companies that support SASIG and how they could help you – with no marketing noise or aggressive sales techniques.
Phishing simulations is a controversial subject, so we want to talk about it! What do we hope to achieve from sending ‘test’ emails? What do we do with those who ‘pass’ or ‘fail’? Is there a better option? Watch this webinar to hear disaster and success stories, and learn from the experts.
The last few years have taught us the importance of connections – not just between people, but between users and their technology. SLAs can no longer be the sole measure of IT success, so let’s put the humanity back into our tech-driven world. Watch this webinar to learn why enhancing the user experience is so important.
Changing security behaviours isn't easy. For the most part, it's grossly misunderstood: awareness of something doesn't translate to behaviour change. In this webinar CybSafe break down the components, steps, and processes needed to change security behaviours in the workplace.
Varonis walked us through the common challenges seen in the field, demonstrated how powerful collaboration features in M365 often result in complexity and pain for IT security, and showed us what truly happens under the hood when users share data in different ways.
More interconnected digital supply chains mean amplified cyber risks. But do supplier contracts always represent a business' risk posture? If not, where can government offer support? DCMS joined us and invited feedback on this area, while explaining how to demand the right level of security in your contracts.
Our widespread adoption of cloud-services and need to share knowledge rapidly provides endless opportunities for information to end up in the wrong hands. Watch as we assess the common issues, share how to educate your organisation, and look at OSINT techniques for red-teamers and bug-bounty hunters.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply