Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Security meets safety - Attacking medical devices and infrastructures

The healthcare industry is increasingly using connected medical devices. And while interconnectivity improves the healthcare offer dramatically, it also increases attack surfaces. Watch now for an overview of the vulnerabilities affecting the medical sector, and the potential horrible effects on human health.

Backup and recovery systems were built for dinosaurs

It takes an average of 17 days to recover from a ransomware attack. How long would it take you? Is that with or without backups? We still operate as if we are backing up/recovering MBs rather than TBs of data, so learn how real-time data protection and time-sensitive recovery could keep you operational.

Breach Simulations: What we learned about the process and ourselves

Global charitable foundation Wellcome Trust started running breach simulations in 2021 and found that even in an exercise, things don’t always go according to plan. Watch now to get an insight into some of the things they discovered, and some of the unexpected benefits (and issues) that running simulations created for them.

New year, new priorities: 3 questions to ask at the start of 2023

The evolving threat landscape, the importance of establishing a baseline, and how to decide where to invest your resources are all explored in this New Year session. These themes are intertwined with solutions to the common blockers for creating a secure culture. Watch now to start 2023 on the right path.

Every cloud has an unsecure lining

Our widespread adoption of cloud services and our need to share knowledge rapidly provide endless opportunities for information to end up in the wrong hands. In this webinar we review the common issues, share how to educate your organisation, and look at OSINT techniques for red-teamers and bug-bounty hunters.

Data-first security: Data classification and control

Preventing data loss is a fundamental goal of any robust cybersecurity strategy. But how much of your sensitive data is overexposed and itching to escape? We discuss why organisations often take on classification and DLP projects, the common challenges, and the pros and cons of various types of controls.

UK Cyber 9/12 - Designing the next generation of cybersecurity leaders

Could you mentor aspiring cybersecurity professionals as they tackle an escalating (fictional) cyber crisis? Perhaps you could be a judge or sponsor the event. Watch now to learn all about the Cyber 9/12 Strategy Challenge, how it is closing the skills gap, and how you can get involved from those who have taken part.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue