Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Understanding the true attack surface of global ICS exposures

Industrial control systems (ICS) are essential to many critical infrastructure operations. With insights from Censys' annual State of the Internet Report, we’ll explore exposed ICS services around the world, the growing threat to human-machine interfaces, and advice for securing ICS systems against attack.

5 years of Microsoft Sentinel: What have we learnt?

Explore the benefits of migrating from traditional SIEMs and hear about lessons learned by implementation engineers on the ground. We’ll discuss common pitfalls and how to approach planning, implementation, and post-deployment optimisation to help you build a roadmap for a successful transition.

The evolution of identity-based attacks and how to stop them

Our increasingly sophisticated adversaries are leveraging valid credentials to move around organisations undetected. Explore how these attacks started and have evolved, the potentially catastrophic impact they can have, and how risk-based conditional access enforcement can help detect and prevent malicious activity.

Ukraine at the crossroads: The future of Europe's security

As the far-reaching consequences of Russia’s invasion of Ukraine continue to unfold, our expert panel will assess the latest updates in the shifting dynamics of the war, the potential impact on Western support for Ukraine, and the broader security implications for Europe.

CISOs are from Mars, CEOs are from Venus - How to communicate cyber risk

Join us as we address the communication gap between cybersecurity and business leaders. We’ll explore a practical analysis framework that can help us translate technical cyber risks into business-focused language. Foster better understanding and alignment between CISOs and CEOs, leading to informed, impactful decision-making.

From cybersecurity to cyber resilience

Discover powerful insights into the constantly evolving cyber-attack surface as we demonstrate the importance of creating an optimised cyber resiliency strategy. Explore the divide between infrastructure and security teams, and how to build an approach that focuses on risk, readiness, recovery, and resilience.

Information operations – State actors, cynics and conspirators

Our expert panel will examine the vulnerability of democracies, the destabilising effects of sophisticated disinformation campaigns, and how education and awareness can help counter them. Explore how nations can combat this growing threat in the grey zone between conflict and peace.

Email security showdown: Which deployment option reigns supreme?

Confused about the best way to deploy email security? Join us as we shed light on the complexities of API, mailbox, and MTA deployment options. We'll discuss the advantages and disadvantages of each approach, helping you make informed decisions to protect your people and defend your data from the #1 threat vector.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue