Webinar Library | SASIG
Forgotten your password?

All our webinars, all in one place

Navigating insider risks in an AI-driven world

Explore the evolving threat landscape of insider threats in the age of AI as we highlight how the advancements in technology amplify insider risks. You’ll learn how insider threats are evolving with AI, how AI is strengthening defences, and how to adopt proactive strategies to protect your organisation.

Emerging tech trends for 2025: Insights from Wavestone’s CISO Radar

Discover three major trends set to define the cybersecurity landscape this year and beyond, according to Wavestone’s latest research and discoveries. This insightful webinar will explore forecasts, expert input, emerging developments, and real-world analysis to help us all prepare for what’s ahead.

Geopolitics: ‘May you live in interesting times’

In the face of huge global insecurity and rapid technological change, what can we as individuals, organisations and societies do to prepare for the worst? Our panel will discuss the latest geopolitical trends, the challenges they present us, and the steps we can take to improve our resilience.

Fake IDs and bad behaviour: Containing rogue actors with mature TDR

Would your cyber setup stop a threat actor with stolen user MFA credentials? Explore this expanding market, the most recent tactics for capturing details, and why speed is of the essence. We’ll look at attack disruption scenarios as well as a model for gauging your threat detection & response maturity.

Understanding the true attack surface of global ICS exposures

Industrial control systems (ICS) are essential to many critical infrastructure operations. With insights from Censys' annual State of the Internet Report, we’ll explore exposed ICS services around the world, the growing threat to human-machine interfaces, and advice for securing ICS systems against attack.

5 years of Microsoft Sentinel: What have we learnt?

Explore the benefits of migrating from traditional SIEMs and hear about lessons learned by implementation engineers on the ground. We’ll discuss common pitfalls and how to approach planning, implementation, and post-deployment optimisation to help you build a roadmap for a successful transition.

The evolution of identity-based attacks and how to stop them

Our increasingly sophisticated adversaries are leveraging valid credentials to move around organisations undetected. Explore how these attacks started and have evolved, the potentially catastrophic impact they can have, and how risk-based conditional access enforcement can help detect and prevent malicious activity.

Not a member yet?

SASIG membership gives you access to all of our resources, and application only takes a few minutes.


Find out more & apply
This website uses cookies, by continuing to use the site you agree to using cookies. Continue