Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Snack-size Active Directory security: 30 minutes a day keeps the bad guys away

Cleaning up years of configuration drift and technical debt can be daunting. But so is recovering from a cyber attack. Join us as we demonstrate a free tool that can identify and remediate identity threats in just half an hour – so there’s no need to choose between saving time and saving your identity infrastructure.

Reviewing role-based access control challenges and attack scenarios

Dive into a real-world attack scenario which exploited default deployment settings in a managed Azure Kubernetes environment and leveraged privilege escalation to access pods and services. Learn about attacker techniques, the dangers of privilege escalation, and how to address vulnerabilities in deployments.

Insights from the McPartland Review of Cyber Security and Economic Growth

The UK’s insurance, legal, and financial sectors are already world-leading – could cybersecurity join them? Explore the report’s recommendations for supporting productivity, competitiveness, innovation, diversity, inclusion, and leadership on the global stage with all that our industry has to offer.

The war in Ukraine: Geopolitical implications for our security

Our expert panel will examine the challenges besetting both sides in the conflict, and how the battlefield may yet influence the Year of Elections across the globe. Join us to learn how technology could be a significant player, with consequences for our future security and prosperity.

Transforming the security operations centre: A paradigm shift

SOC transformation has never been more pressing. Adversaries leverage sophisticated tactics to execute attacks in mere minutes, but our traditional frameworks struggle to keep pace. What can we do to allow our teams to focus on critical issues and reduce alert fatigue? It starts with a strategic shift in operations.

Understanding the new SaaS cyber kill chain

As we rely more on cloud and software-as-a-service, identities are the new digital perimeter. We’ll share research into how SaaS attacks unfold and how to stop them, real-life examples of SaaS-native techniques, and how ‘networkless’ attacks combine multiple tactics to bypass your company’s endpoints.

Exploiting large language models (LLMs): A new age in offensive security

Any sufficiently advanced technology can be used for both benevolent and malicious purposes. We’ll explore how LLMs have moved beyond deep fakes for our use in offensive security, such as phishing pretext generation, as well as examining some of the attacks against LLMs that could be exposing your business.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue