Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Third-party risk management – Why care and how can InfoSec help?

Third-party risk management is a critical aspect of information security. Dive into the risks associated with third parties, why they matter, and strategies for effectively mitigating them. While there's no silver-bullet solution, join us for valuable insights and practical approaches that could help you.

Navigating the SOC landscape: Optimisation or evolution?

In today’s dynamic threat environment, organisations must decide whether to evolve their SOC incrementally or pursue a transformative overhaul. Through real-world examples, learn how to assess your security posture, balance AI-driven transformation with human expertise, and craft a roadmap to optimise your SOC.

Why traditional vulnerability management fails: Switching to risk-based

Traditional vulnerability management (VM) approaches often struggle to keep up with the evolving threat landscape due to outdated prioritisation methods and lack of context. Join us to learn about the advantages of adopting a risk-based strategy, and practical tips on how to successfully make the transition.

Engaging security leadership: Building a security-first culture

Leadership plays a pivotal role in an organisation’s culture. Learn how to educate your execs on emerging threats (without disrupting their busy workflows), demonstrate ROI using metrics, and integrate security practices that align with security goals into daily operations to drive safer behaviours.

Navigating insider risks in an AI-driven world

Explore the evolving threat landscape of insider threats in the age of AI as we highlight how the advancements in technology amplify insider risks. You’ll learn how insider threats are evolving with AI, how AI is strengthening defences, and how to adopt proactive strategies to protect your organisation.

The 6 cybercrime trends organisations can’t ignore in 2025

Discover the pivotal trends shaping the future of cybercrime, according to a recent survey of 500 senior IT and security decision-makers. We’ll explore how these trends are redefining our approach to cybersecurity, and strategies you can implement to navigate the rapidly evolving threat landscape.

Dirty deployment: Nobody puts Apple in the corner - leveraging macOS telemetry

A Mac deployed without visibility is like a dance without rhythm – you are bound to miss a step. Watch now to learn how macOS telemetry ensures compliance, accelerates investigations, and enables proactive threat hunting. With the right tools, you can integrate Apple into your security strategy, because nobody should put Apple in the corner.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue