Watch now to explore key aspects of the EU's NIS2 Directive and its implications for organisations operating in the UK. As the cybersecurity landscape continues to evolve, are we prepared for the effects of NIS2? And is the government ready to adopt it here in the UK?
All our webinars, all in one place
Watch now as we looked behind the curtain and found the secrets to enable your organisation to collect and use data securely and extract its full potential. We also looked at the key questions you should ask to assure you and your organisation about your most valuable asset.
This talk gives an overview of GovAssure, and delve into how to systematically approach the scoping, self-assessment and outcomes in a practical and useful way. The overall outcome for this talk is to help organisations understand how to approach GovAssure and achieve compliance in the long term.
We operate in a world of constantly evolving threats while trying to meet various (and sometimes differing) security standards. Join us to explore data sovereignty and how you can ensure compliance and avoid legal pitfalls. Learn about best practices to enable security and compliance for your sensitive data assets.
What are the regulatory enforcement ‘hot buttons’? Are regulators growing in confidence and fining more? In this webinar we discussed these questions and reviewed DLA Piper’s 2022 report on GDPR fines and breach notifications. Watch now to learn about the major themes of last year and what it means for 2023.
Watch now to discover practical ways you can protect your reputation and business for free. Explore simple processes and assess your cyber circle to improve your cybersecurity right away – all advice can be actioned straight away as it requires no technical knowledge or funding.
Increasingly complex network infrastructures, bad actors, and threat landscapes mean we need greater vigilance to ensure our cyber defences are monitored and effective. Learn how to run ‘what if’ analysis on network models, check your security posture and gain executive visibility into compliance.
Did you know an employee’s Gmail could endanger your company Salesforce data? We demonstrate how attackers exploit personal email accounts to gain access to corporate clouds and steal highly confidential customer data. Learn how the attack is performed and how to prevent cross-cloud attacks.
Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply