Join us for an in-depth analysis of the brand-new Cybersecurity Trends survey results. We’ll examine emerging trends such as the use of AI in cyber attacks, how security leaders are spending their budgets, and what adjustments organisations can make based on the incidents of today and the threats of tomorrow.
All our webinars, all in one place
Did you know that a key tool in our global defence armoury is at risk due to budget cuts by the US Administration? Join our panel of industry experts to discuss what is happening, the future of this foundation for threat assessments, and how losing the programme would affect us all.
AI and consumer electronics mean drone warfare has never been so accessible. Its adoption is changing the character of conflict and presents many challenges. Join us as we explore current and potential future trends in employment and deployment of drones, the challenges, and how we can prepare ourselves.
Explore the evolving threat landscape of insider threats in the age of AI as we highlight how the advancements in technology amplify insider risks. You’ll learn how insider threats are evolving with AI, how AI is strengthening defences, and how to adopt proactive strategies to protect your organisation.
Discover three major trends set to define the cybersecurity landscape this year and beyond, according to Wavestone’s latest research and discoveries. This insightful webinar will explore forecasts, expert input, emerging developments, and real-world analysis to help us all prepare for what’s ahead.
In the face of huge global insecurity and rapid technological change, what can we as individuals, organisations and societies do to prepare for the worst? Our panel will discuss the latest geopolitical trends, the challenges they present us, and the steps we can take to improve our resilience.
The rush to adopt new technologies can often mean organisations overlook the risks they carry. So how do those of us responsible for resilience raise concerns without being dismissed? Join us as we explore how to effectively influence the risk-benefit discussion when onboarding the latest innovations.
Would your cyber setup stop a threat actor with stolen user MFA credentials? Explore this expanding market, the most recent tactics for capturing details, and why speed is of the essence. We’ll look at attack disruption scenarios as well as a model for gauging your threat detection & response maturity.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply