How many of your data breaches are due to your own people, whether by accident or on purpose? Watch now to navigate the fact and fiction around insider threat with a light-hearted look at this serious risk topic.
All our webinars, all in one place
With the help of AI-driven tools, phishing scams can be executed on an unprecedented scale. We explore hackers’ intricate tactics, including how they impersonate trusted entities across industries and exploit vulnerabilities, as well as how machine learning can help spot the attacks bypassing our defences.
We explore the evolving market for vulnerability trading and examine whether companies are potentially creating their own weaknesses. Learn what ESET discovered when they tested decommissioning processes, including what critical data from the previous owner was still accessible and open to abuse.
We discussed how the control and manipulation of information is becoming an existential threat to our society, freedoms, and security. We are bombarded with so much information, it can be difficult to objectively assess if what we are presented with is true or even real. Is AI helping lead us to an Orwellian reality?
SIEMs are powerful tools for detecting and responding to threats. Watch now as we explored why integration challenges persist, strategies to enhance the 'stickiness' of your SIEM, and case studies of how other organisations have tackled the challenge.
Recent events demonstrate that the war is not going well for the Kremlin. The impact of counter-offensives and the undermining of President Putin’s authority will not only shape the fortunes of the two sides, but the future of European security. Our panel discuss the implications for our work, the UK, and cyberspace.
Business email compromise is a $2.4bn problem. The attacks are lucrative and easy to execute, yet security controls struggle because of BEC’s targeted and novel nature. Attackers are at a turning point with their tools and techniques, so how do we defend ourselves when they are constantly adapting?
A security gap in your Active Directory could be enough to shut down your entire business operations. Watch now to learn how this happens, how a telco company recovered from this type of attack, and how you can respond effectively to an in-progress attack on your identity systems with step-by-step guidance.

Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply