Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

How to build an advanced email security strategy

Most cyberattacks still start with or involve email, so stopping threats at this stage can strengthen your entire security strategy. Learn about the latest attack techniques and how developing an advanced strategy for emails can empower you to adapt to evolving threats, reduce costs, and respond sooner.

Optimising vulnerability management: Finding the needle in a haystack

With over 20,000 new vulnerabilities published last year alone, how do you prioritise them? Discover how a network model of your infrastructure can put threats into the context of your environment and help you prioritise what needs to be taken care of right away, and what can wait.

Applying and integrating the MITRE ATT&CK methodology

With the 4th round of the MITRE Engenuity ATT&CK out, it’s important for us to learn how the evaluation and methodology can be used in our organisations. We look at this year’s results and discover how to apply and integrate the framework into your organisation to assess and improve your cyber strategy.

Beyond The Lazarus Heist – The nation-state/cybercrime nexus

The Lazarus Group is accused of carrying out a decade of cyber attacks on behalf of the North Korean Government. We hear from author and investigative journalist Geoff White as he explores what this world tells us about the growing links between government cyber attackers and organised crime gangs. In his forthcoming book (which you can pre-order here: www.penguin.co.uk/books/447163/the-lazarus-heist), Geoff explores this topic further by taking you inside the hidden world of the Lazarus gang and its global network of criminal accomplices.

Anticipate and defend against adversaries targeting SaaS and IaaS

Misconfigured APIs, over-exposed sensitive data, and shadow admins are just some of the SaaS security challenges organisations face today. Join us as we will take a deep dive into some of the most common attack scenarios and cover steps you can take to secure your SaaS and IaaS environments.

Decoding the 4th round of MITRE Engenuity ATT&CK Enterprise Evaluations

The latest round of evaluations brings much-needed visibility to the EDR and XDR space. Understanding the results helps drive advancement and alignment throughout the cybersecurity industry, so we take a deep dive into Wizard Spider, Sandworm, singularity XDR and what ATT&CK Evaluation means for businesses.

How is the cyber threat landscape shaping regulatory requirements?

We explore the crucial cyber threat developments shaping the UK’s regulatory landscape, key lessons in enhancing cyber resilience with intelligence-led security testing schemes, how Covid forced SOCs into non-compliance, and thoughts for the future of operating secure environments.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.

Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue