Forgotten your password?

All our webinars, all in one place

Cloud tradeoff: Data control or cloud benefits?

Learn the techniques to keep data un-sensitive, unintelligible and of no value to unauthorised users. We look at the concerns of storing sensitive data, how to meet compliance requirements, and how to maintain integrity in the face of a cloud service outage.

The human element of cybersecurity in the age of hybrid working

The world could not have survived the pandemic without the internet, and Covid-19 has finally and firmly established cybersecurity as a critical business enabler. In the age of hybrid working, we must now step up to the new challenges both in technology, the threat landscape, and the supervision of our remote-working employees.

Attack of the Hybrids! Goodbye cubicles, hello security problems

Although implemented seemingly overnight, the hybrid workforce has become a long-term reality. Security controls relaxed in the rush now need addressing before they become even more of a security risk. And as we see increased attack surfaces and volumes, this new era is a chance to avoid repeating past mistakes.

Playing video games: A new route to working in cyber?

The global economy is suffering dramatic skills shortages, especially in digital and soft skills. Discover how certain games and genres are sources of soft skills and other talents that are essential to the future of work, including leadership, collaboration, and logical thinking.

Creating a financial wellbeing strategy with your employees in mind

Did you know that 27% of employees state that their financial worries have an impact on their performance at work? We share how embedding a financial wellbeing strategy can reduce insider risk, how Schroders Personal Wealth developed their initiative, and tips for designing and embedding your own strategy.

Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2021

It’s widely recognised that the human aspect of cybersecurity is critical but not well understood. The empirical evidence is limited. In a first-of-its-kind project, user security behaviours and attitudes have been examined with scientific rigor. Join us to discover and explore the key findings.

When we can’t protect everyone all the time, who gets the Kevlar jacket?

With so many people and limited resources, it can be difficult to focus our attention and prioritise the right risks. We discuss the ways to identify users who are imminent targets and those who pose a high risk, and how to address the needs of different groups based on their profile – in a timely fashion.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue