The concept of effective SecOps is continually evolving and has moved beyond just having a SOC or a SIEM system. Join us to explore how your organisation can enhance security operations to not only improve your overall security maturity, but also remain compliant with existing and future regulations.
All our webinars, all in one place
Critical infrastructure relies on operational technology, making it a high-value target for cybercriminals. A successful attack can cause major disruption. We’ll use a real-world example to demonstrate the key principles behind OT security monitoring and how to detect and respond to unseen dangers.
Watch now to learn proactive steps your organisation can take to fully understand your vulnerability to real world threats. You’ll see an attack simulation being set up and run, watch an assumed breach unfold, look at the difference between red teams and pen-testing, and how they actually work.
Bringing in external managed detection and response (MDR) or creating an internal team needs a lot of thought. For some, a 24/7/365 service may seem out of reach. Watch now as we outlined what detection and response really is and some of the fundamentals that will help you find what works for your organisation.
Engaging your C-Suite and getting them to actively participate in cybersecurity issues has been a challenge for decades. Watch now to learn how to educate your senior executives in a stimulating, self-driven way, so they become confident to get involved in unfamiliar and daunting topics (such as cybersecurity!).
Despite alarming predictions, UK executives still prioritise cyber-attack recovery over prevention. Watch now as we explored how privacy-by-design can help manage compliance risks and digital supply chains, as well as how to focus on a strategic framework that integrates self-awareness and risk-based security.
Watch now to discover insights from a year’s worth of incident responses, including motivations behind attacks, the staggering percentage of ransomware attacks wielding dual threats of both exfiltration and encryption, and why smaller organisations are often notified of incidents by their larger customers.
Watch now as we explored how understanding the regulatory environment can help you improve your cyber posture, and how a transparent and collaborative approach to the security of your supply chains can help expose and mitigate vulnerabilities.
Not a member yet?
SASIG membership gives you access to all of our resources, and application only takes a few minutes.
Find out more & apply