Efficacy within cybersecurity can be poor, and continued growth in spend has not (so far) resulted in reduced overall losses. How do we increase transparency in the market so that we can avoid the duds/lemons? Watch now to hear about research with stakeholders and front-line users, and learn tips for finding peaches among the lemons.
All our webinars, all in one place
Whether you want to discover the latest updates from leaders in the cybersecurity industry or are curious what we mean by 'Supporters', watch now and meet the organisations who help make SASIG possible. This is a fantastic opportunity to learn more about the companies that support SASIG and how they could help you – with no marketing noise or aggressive sales techniques.
Whether you want to discover the latest updates from leaders in the cybersecurity industry or are curious what we mean by 'Supporters', watch this recording to discover some of the organisations who help make SASIG possible. This is a fantastic opportunity to learn more about the companies that support SASIG and how they could help you – with no marketing noise or aggressive sales techniques.
Service level agreements are a timeless business issue, especially when they are the sole measurement of success. Your IT system may technically work, but have you considered the user experience? In this webinar, we examine the issues caused by SLAs and why a positive UX is so important for staff and your bottom line.
More interconnected digital supply chains mean amplified cyber risks. But do supplier contracts always represent a business' risk posture? If not, where can government offer support? DCMS joined us and invited feedback on this area, while explaining how to demand the right level of security in your contracts.
Although their budgets may be increasing, CISOs are often stuck between the organisational pressures to do ‘something’ to improve resilience, and the pressurised sales tactics of service and solutions providers. So how can we choose the best provider for our needs? We explore how to choose the right provider for you and your organisation, in an efficient way.
Whether we are colleagues, employer and employee, or customer and supplier, we must all work together in some way. So, as a special plea, can we all try to be nice? Our panel discuss the impact of courtesy (or the lack of it) on their work.
Even when equipped with the best technology and people, attacks can often go undetected because security teams are too busy treating the symptoms of a breach instead of the root causes. Join us to learn why excessive network access is the true cause of many breaches, and how the least privilege principle can be scaled to protect any resource.