Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Dive into our extensive back catalogue, featuring over 900 webinars since the series started in 2020.

Discover a fascinating array of topics across the cybersecurity landscape. Whether you’re exploring the latest innovations, seeking expert insights or sharpening your skills, our library is your go-to resource - accessible anytime, anywhere.

Start learning and unlock the knowledge that matters to you!

What’s wrong with the modern SOC?

Modern Security Operations Centres are overwhelmed by alerts, tool sprawl, and evolving threats. We explored why legacy approaches no longer work and how AI and full data context can help your security teams detect smarter, respond faster, and finally regain control.

Trusted and not verified: The blind spots fuelling insider threats

Join this candid conversation for real stories and takeaways to challenge your views on insider risk. Explore how trusted individuals (including third parties) can pose the biggest risks, understand intent before impact, and see how analytics can reveal what we often miss.

Ukraine update: The only sure thing in life…

Over the past few years, Ukraine has taught us a huge amount about national resilience. But can it continue to stand up to Russia? How does Europe – including the UK – realign its security strategy with questions hanging over the US? And what are the implications for our online security?

The power of AI against adversaries

Cyber adversaries are increasingly leveraging artificial intelligence to launch sophisticated, high-speed attacks. To defend against them, we need to harness AI ourselves. Join us to examine real-world threats and get practical advice on embedding AI into your daily security operations.

Third-party risk management – Why care and how can InfoSec help?

Third-party risk management is a critical aspect of information security. Dive into the risks associated with third parties, why they matter, and strategies for effectively mitigating them. While there's no silver-bullet solution, join us for valuable insights and practical approaches that could help you.

Fake IDs and bad behaviour: Containing rogue actors with mature TDR

Would your cyber setup stop a threat actor with stolen user MFA credentials? Explore this expanding market, the most recent tactics for capturing details, and why speed is of the essence. We’ll look at attack disruption scenarios as well as a model for gauging your threat detection & response maturity.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue