Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

A Security Odyssey: How we’re building a culture of security

Like many organisations, Computershare has been on a journey from compliance-based security to behaviour-based security awareness. Hear about their successes, struggles and solutions over the past three years, the benefits (both expected and unexpected), and what they hope to achieve next.

Building secure habits: A behavioural science perspective

Our industry has long overlooked how and why people form habits. But when we ignore the psychology behind effective habit-building, we create a clash between habit and intention in routine tasks. In this webinar, we discuss the science, why cues and context are so important, and how to replace existing habits.

Misinformation, disinformation, and malinformation - The illusion of truth

We discussed how the control and manipulation of information is becoming an existential threat to our society, freedoms, and security. We are bombarded with so much information, it can be difficult to objectively assess if what we are presented with is true or even real. Is AI helping lead us to an Orwellian reality?

A deep dive into security awareness engagement taxonomy

How many tactics are you using to drive security awareness engagement? If you can count them on one hand, watch now us to learn about more than 30 scientifically researched and categorised new approaches that you can use to reduce user-related security incidents without compromising compliance.

Redesigning how we think about metrics: How to ask without asking

Security awareness teaches things. Metrics measure things. But we often struggle to get useful metrics from our awareness programmes. Re-evaluate the measurements you really want and need, then discover how to generate reliable, useful, and meaningful metrics that answer the questions we can’t ask.

Privilege escalation: How attackers take control of all your data

Hackers don't hack in, they log in. Once a bad actor has admin-level access to your network, often through social engineering, they effectively own everything on that network. Watch now to learn how and why this happens, the techniques attackers use, and how to minimise your risk by reducing your attack surface at every layer.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue