Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Third-party risk management – Why care and how can InfoSec help?

Third-party risk management is a critical aspect of information security. Dive into the risks associated with third parties, why they matter, and strategies for effectively mitigating them. While there's no silver-bullet solution, join us for valuable insights and practical approaches that could help you.

Fake IDs and bad behaviour: Containing rogue actors with mature TDR

Would your cyber setup stop a threat actor with stolen user MFA credentials? Explore this expanding market, the most recent tactics for capturing details, and why speed is of the essence. We’ll look at attack disruption scenarios as well as a model for gauging your threat detection & response maturity.

Understanding the true attack surface of global ICS exposures

Industrial control systems (ICS) are essential to many critical infrastructure operations. With insights from Censys' annual State of the Internet Report, we’ll explore exposed ICS services around the world, the growing threat to human-machine interfaces, and advice for securing ICS systems against attack.

5 years of Microsoft Sentinel: What have we learnt?

Explore the benefits of migrating from traditional SIEMs and hear about lessons learned by implementation engineers on the ground. We’ll discuss common pitfalls and how to approach planning, implementation, and post-deployment optimisation to help you build a roadmap for a successful transition.

Insiders on the outside: When supply chains attack

Delve into the hidden perils posed by cyber villains who infiltrate and manipulate your organisation from the outside. Explore real-world examples of devastating cyber attacks, identify common security weaknesses, and arm yourself with the knowledge to fortify your defences against shadowy figures.

The human risks that haunt you (and how to ghost them)

Explore the workplace threats lurking beneath the surface, like password reuse, shadow IT, and oversharing sensitive data. These often-overlooked dangers can significantly impact your risk levels, so join us to understand why they occur, their implications, and practical steps to mitigate them – beyond just increasing training!

How to hunt for threats in the browser

As attacks move away from endpoints and networks, our browsers are becoming the new frontline for identity attacks, with no need for local malware deployment. Join us to learn about attacker techniques and tools, discover what we can detect using a browser agent, and see video demos of detections and SecOps use cases.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue