Explore the evolving threat landscape of insider threats in the age of AI as we highlight how the advancements in technology amplify insider risks. You’ll learn how insider threats are evolving with AI, how AI is strengthening defences, and how to adopt proactive strategies to protect your organisation.
All our webinars, all in one place
Discover three major trends set to define the cybersecurity landscape this year and beyond, according to Wavestone’s latest research and discoveries. This insightful webinar will explore forecasts, expert input, emerging developments, and real-world analysis to help us all prepare for what’s ahead.
In the face of huge global insecurity and rapid technological change, what can we as individuals, organisations and societies do to prepare for the worst? Our panel will discuss the latest geopolitical trends, the challenges they present us, and the steps we can take to improve our resilience.
The rush to adopt new technologies can often mean organisations overlook the risks they carry. So how do those of us responsible for resilience raise concerns without being dismissed? Join us as we explore how to effectively influence the risk-benefit discussion when onboarding the latest innovations.
Would your cyber setup stop a threat actor with stolen user MFA credentials? Explore this expanding market, the most recent tactics for capturing details, and why speed is of the essence. We’ll look at attack disruption scenarios as well as a model for gauging your threat detection & response maturity.
Industrial control systems (ICS) are essential to many critical infrastructure operations. With insights from Censys' annual State of the Internet Report, we’ll explore exposed ICS services around the world, the growing threat to human-machine interfaces, and advice for securing ICS systems against attack.
Explore the benefits of migrating from traditional SIEMs and hear about lessons learned by implementation engineers on the ground. We’ll discuss common pitfalls and how to approach planning, implementation, and post-deployment optimisation to help you build a roadmap for a successful transition.
Our increasingly sophisticated adversaries are leveraging valid credentials to move around organisations undetected. Explore how these attacks started and have evolved, the potentially catastrophic impact they can have, and how risk-based conditional access enforcement can help detect and prevent malicious activity.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply