Measuring and mitigating human risk without being restrictive can be difficult. Join us to learn about using innovative training methods and tools to build a strong security culture that strikes the perfect balance between risk mitigation and employee satisfaction, ultimately creating a more resilient and harmonious workplace.
All our webinars, all in one place
Join this interactive webinar for a guide to structured, long-term awareness and an organisation-wide security culture. We’ll explore measurable goals, monthly risk focuses, and guidelines for AI use, as well as insights on prioritising high-risk groups, leadership support, and strategic communication.
Join us for a hands-on exercise based on real-world adversaries causing large-scale disruption today. You'll make key decisions that will shape the outcome of an attack and recovery efforts. Learn about major threat actors, stress-test your problem-solving skills, and take away actionable insights.
As attacks move away from endpoints and networks, our browsers are becoming the new frontline for identity attacks, with no need for local malware deployment. Join us to learn about attacker techniques and tools, discover what we can detect using a browser agent, and see video demos of detections and SecOps use cases.
With phishing attacks are evolving rapidly; how prepared is your industry? Explore KnowBe4's 2024 UK & Ireland Phishing Benchmarking Report to discover where you stand, learn effective strategies to lower your Phish-prone Percentage™, and find out how to lead in phishing defence across all sectors.
Even the most advanced tools cannot stop all breaches. Join us to bust some intelligence myths, examine how threat intelligence can be used before, during and after a breach, and discuss the role of threat hunting in securing the enterprise, all through the lens of the ever-evolving threat landscape.
With the Digital Operational Resilience Act due to come into force next year, many of us are preparing for its stringent requirements. Join us to discover key market insights and common interpretations, and to discuss the testing programmes that lack specification but aim to enhance our resilience posture.
Why are living off the land (LOTL) attacks so difficult to detect? Learn how they work through a real-life case study and a recent example of attacks against critical infrastructure organisations. We’ll explain how attackers use our own tools and processes against us, and what we can do to stop them.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply