Discover a risk-based approach to cybersecurity, prioritising vulnerabilities based on business impact, rather than technical compliance. Learn how aligning cybersecurity with business goals improves resilience and the importance of consolidating risk data for targeted remediation where it matters most.
All our webinars, all in one place
Explore the complex and changing world of cybersecurity regulations in the EU and UK. In this webinar we compared key frameworks, their impact on compliance and security strategies, and what they mean for organisations and society. We gained practical insights and guidance to strengthen both cybersecurity and compliance.
More than 90% of all global digital communications and financial transactions are transmitted by undersea cables every day. But few people recognise our reliance on these unseen pipelines through which data, energy, and money flow. We discussed how we respond to the growing threats to undersea networks.
Third-party risk management is a critical aspect of information security. Dive into the risks associated with third parties, why they matter, and strategies for effectively mitigating them. While there's no silver-bullet solution, join us for valuable insights and practical approaches that could help you.
In today’s dynamic threat environment, organisations must decide whether to evolve their SOC incrementally or pursue a transformative overhaul. Through real-world examples, learn how to assess your security posture, balance AI-driven transformation with human expertise, and craft a roadmap to optimise your SOC.
Join us to learn about new legislation that started coming into force in February, including its rollout timetable, main requirements, regulators, and sanctions. We’ll also look at the types of AI in scope, people and organisations affected, AI supply chain complexities, and the UK’s position on AI regulation.
Traditional vulnerability management (VM) approaches often struggle to keep up with the evolving threat landscape due to outdated prioritisation methods and lack of context. Join us to learn about the advantages of adopting a risk-based strategy, and practical tips on how to successfully make the transition.
Leadership plays a pivotal role in an organisation’s culture. Learn how to educate your execs on emerging threats (without disrupting their busy workflows), demonstrate ROI using metrics, and integrate security practices that align with security goals into daily operations to drive safer behaviours.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply