Industrial control systems (ICS) are essential to many critical infrastructure operations. With insights from Censys' annual State of the Internet Report, we’ll explore exposed ICS services around the world, the growing threat to human-machine interfaces, and advice for securing ICS systems against attack.
All our webinars, all in one place
Explore the benefits of migrating from traditional SIEMs and hear about lessons learned by implementation engineers on the ground. We’ll discuss common pitfalls and how to approach planning, implementation, and post-deployment optimisation to help you build a roadmap for a successful transition.
Our increasingly sophisticated adversaries are leveraging valid credentials to move around organisations undetected. Explore how these attacks started and have evolved, the potentially catastrophic impact they can have, and how risk-based conditional access enforcement can help detect and prevent malicious activity.
As the far-reaching consequences of Russia’s invasion of Ukraine continue to unfold, our expert panel will assess the latest updates in the shifting dynamics of the war, the potential impact on Western support for Ukraine, and the broader security implications for Europe.
Join us as we address the communication gap between cybersecurity and business leaders. We’ll explore a practical analysis framework that can help us translate technical cyber risks into business-focused language. Foster better understanding and alignment between CISOs and CEOs, leading to informed, impactful decision-making.
Discover powerful insights into the constantly evolving cyber-attack surface as we demonstrate the importance of creating an optimised cyber resiliency strategy. Explore the divide between infrastructure and security teams, and how to build an approach that focuses on risk, readiness, recovery, and resilience.
Our expert panel will examine the vulnerability of democracies, the destabilising effects of sophisticated disinformation campaigns, and how education and awareness can help counter them. Explore how nations can combat this growing threat in the grey zone between conflict and peace.
Confused about the best way to deploy email security? Join us as we shed light on the complexities of API, mailbox, and MTA deployment options. We'll discuss the advantages and disadvantages of each approach, helping you make informed decisions to protect your people and defend your data from the #1 threat vector.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply