Industrial control systems (ICS) are essential to many critical infrastructure operations. With insights from Censys' annual State of the Internet Report, we’ll explore exposed ICS services around the world, the growing threat to human-machine interfaces, and advice for securing ICS systems against attack.
All our webinars, all in one place
The definition of CNI is changing, but why? And what can we do about it? Join us to discuss which organisations should be classed as CNI, the ever-expanding role of the MSSP community in securing cyberspace – as well as when, why, and critically how, the UK Government should become involved.
Explore the benefits of migrating from traditional SIEMs and hear about lessons learned by implementation engineers on the ground. We’ll discuss common pitfalls and how to approach planning, implementation, and post-deployment optimisation to help you build a roadmap for a successful transition.
Delve into the hidden perils posed by cyber villains who infiltrate and manipulate your organisation from the outside. Explore real-world examples of devastating cyber attacks, identify common security weaknesses, and arm yourself with the knowledge to fortify your defences against shadowy figures.
Explore the workplace threats lurking beneath the surface, like password reuse, shadow IT, and oversharing sensitive data. These often-overlooked dangers can significantly impact your risk levels, so join us to understand why they occur, their implications, and practical steps to mitigate them – beyond just increasing training!
As attacks move away from endpoints and networks, our browsers are becoming the new frontline for identity attacks, with no need for local malware deployment. Join us to learn about attacker techniques and tools, discover what we can detect using a browser agent, and see video demos of detections and SecOps use cases.
Our networks can be so complex that identifying areas of risk is almost impossible. Seeing (and understanding) your attack surface is critical to a successful security strategy. Discover how a working model of your network could help you supercharge security, simplify compliance, and change processes.
With the enforcement date fast approaching, we must all prepare for NIS2’s enhanced cybersecurity standards. We’ll demystify the directive to help you understand your new obligations, particularly around incident response and supply chain management, and give you actionable insights for readiness.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply