Forgotten your password?

All our webinars, all in one place

Welcome and Opening keynote - The cybersecurity strategy for health and social care - SASIG Healthcare Cybersecurity Symposium 2022

Martin Smith MBE and Adam Wild welcome and introduce the day, followed by the opening keynote where Phil Huggins and John Noble CBE give a summary preview of the cybersecurity strategy for health and social care to be published in April 2022. They also describe the important new cybersecurity guide developed and published for NEDs of NHS trusts that is relevant to many other organisations.

Boosting the cybersecurity of the UK's digital supply chains

The Government recently consulted UK plc on the cybersecurity challenges organisations face with their digital supply chains. DCMS explains how we can all enhance the security of our supply chains and third-party IT services, as it outlines the Government's next steps in helping businesses become more resilient to supply chain incidents.

The DWP approach to supply chain security assurance

A rare chance to hear first-hand about the Department for Work and Pensions’ supply chain security journey over the last few years. They tell us about the challenges they faced and how they overcame them, as well as give advice on good starting points for others embarking on this journey.

Do you want to know how a hacker is looking at your organisation as a target?

Cybercriminals profile your organisation in detail by mapping your external attack surface. Do you know what and how much they can see? Or the data points of your digital presence they could use? This webinar provides an in-depth understanding of external attack surface management (EASM) and how best to derive measurable value.

Why you should include suppliers in your security risk assessments

Supply chain attacks have increased in frequency and severity in recent years and even months, but what makes these attacks different from other cyber attacks? And what do they mean for our businesses? Learn how to manage your supply chain risks and the precautions corporations can take.

Supply chain attacks are the new high-water mark of attacks

Attackers will always choose the easiest path most likely to succeed. And which is a target more likely to open – the unknown email with an attachment, or an invoice from a known and trusted supplier? We analyse some of the most prominent recent supply chain attacks and share how to combat them.

The supply chain: Our modern Achilles' heel?

Recent ransomware attacks have once again highlighted both our dependence on supply chains and our vulnerability to attacks through them. Do we fully understand the risks, or have we become overwhelmed by their complexity? Join us as we explore how to manage supply chain risks and the steps you can take to mitigate them.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue