Spectrami & Partner Webinars

Spectrami as well as our partners and vendors offer webinars for a wide range of  IT Security topics. Here´s an overview of available and free webinars.

On-Demand Webinars


CipherTrace Logo
Partner Webinar: Introduction to CipherTrace – Virtual Asset Risk Mitigation

Presented by: CipherTrace

As evident in recent news, Bitcoin is gaining acceptance among main stream investors and companies. At the same time, cryptocurrency risk intelligence and tracing is becoming a compliance mandate in many countries.

Join us for this Partner Webinar to learn how CipherTrace can help in digital transaction tracing and securing the crypto economy. The topics would include:

  • Financial Investigation and Bitcoin Forensics – with CipherTrace Inspector
  • Cryptocurrency Anti Money Laundering – with CipherTrace Sentry
  • Full suite of VASP Risk Monitoring and Due Diligence – with CipherTrace Armada


Menlo Security Logo
Securonix Logo
Seclytics logo
Check Point Logo
Virtual Summit: When even Hunters are being Hunted!
Predictive Cyber Defense Agains the Inevitable
Year 2020 changed the Cyber Threat landscape of all organizations. Opportunistic threat actors used this chaos as a ladder and targeted organizations worldwide and the sophistication level has reached a point where even giants of cybersecurity industry are getting breached.
In this era where even “Hunters are being Hunted”, legacy Prevention and Detection-based cybersecurity approach is not enough. Spectrami invites you to this unique event where we will delve into the key factors that will help you learn how to stay 10 steps ahead of threat actors!
Join us for an interesting Virtual Summit to get deeper insights into critical topics like :
  • Zero Trust Internet – Moving Beyond “Amost Safe” 
    by Kowsik Guruswamy, Chief Technology Officer, Menlo Security
  • Improving SOC Effectiveness Using Behavior Analytics and Machine Learning Technology 
    by Augusto Barros, VP, Solutions Securonix
  • You Are Doing Predictive Threat Intelligence Wrong 
    by Saeed Abu-Nimeh, Founder and CEO, Seclytics
  • Strategic Insights from Past Generations of Threats – Protect against Gen V attacks
    by Neatsun Ziv, VP, Threat Prevention Check Point
  • Panel Discussion – How are CISOs preparing the board for post SolarWinds breach
    Saghir Ahmed Khan, Leader, Security Operations Center, SABIC, KSA
    Ahmed Hasan Al Lawati, Section Head, Information Security, Ooredoo Oman
    Sameer Shaikh, Managing Director – Middle East and Africa, Galaxkey


Onapsis Logo
Webinar: SAP Security Threat Landscape 2021

Presented by: Onapsis

In the past few years, 64% of organizations’ ERP systems have been breached, according to a research study by IDC.

Are you aware how attackers have breached and can break into unprotected customer SAP landscapes?

Attend this session to gain insights into:

  • What attacks on your SAP systems look like
  • What security challenges exist in SAP environments (e.g. S/4HANA)
  • Moving to the cloud with confidence — how to address security in hybrid landscapes
  • Ways to protect your organization


Silobreaker logo
CrowdStrike Logo
Virtual Briefing: Understanding the Middle East Threat Landscape

Presented by: Anomali, Silobreaker, CrowdStrike

About The Event
Learn about emerging threats and innovative threat intelligence strategies from CrowdStrike, Silobreaker, and Anomali! This virtual threat briefing will bring the community together to discuss threat intelligence challenges, requirements, and best practices. Industry experts will provide briefings on today’s threat landscape, adversaries, and their attack techniques

Who Should Attend
This session is intended for both CXO and senior cyber security professionals. Attendees can anticipate walking away with recommendations for their teams and tangible information to research within their own environments.

Earn CPE Credits
Are you a certified CISSP? You can earn up to 1.5 CPE credits for attending this event. Instructions for claiming your CPE will be sent over email following the conclusion of the event.

Win Gift Vouchers
Stand a chance to be one of the three winners to win $50 vouchers each.


Algosec Logo
Webinar: Build and enforce defense in-depth | An AlgoSec-Cisco Tetration webinar

Presented by: Algosec

Micro-segmentation protects your workloads and applications against lateral movement of malware and limits the spread of insider threats, yet successfully implementing a defense-in-depth strategy using micro-segmentation is complicated. In this technical workshop, Nitin Rajput, Pre-Sales Lead APAC & ME at AlgoSec and Mazen Al Jundi, Technical Solutions Architect at Cisco, will provide a step-by-step blueprint to implementing this strategy using the micro-segmentation capabilities of network security policy management capabilities of AlgoSec and Cisco Tetration.

They will demonstrate how to tighten your security posture within the data center using an allow-list approach. They will also show how to enforce these granular micro-segmented policies enforced on the workloads with Cisco Tetration and a coarse grain policy enforced across the infrastructure through AlgoSec network security policy management.

Join this workshop to learn how to:

  1. Understand your business applications to create your micro-segmentation policy
  2. Validate your micro-segmentation policy is accurate
  3. Enforce these granular policies on workloads and summarized policies across your infrastructure
  4. Use risk and vulnerability analysis to tighten your workload and network security
  5. Identify and manage security risk and compliance in your micro-segmented environment


Wedge Networks Logo
Webinar: Ransomware – Protect yourself in real time with Wedge Networks

Presented by: Wedge Networks

The world is rapidly changing. In the Cloud Connected World, enterprise security capacity is unable to keep up with the rapidly expanding security workloads, causing a widening security gap. Customers are in need of Real-time prevention to protect them from advanced threats. Ineffective malware prevention is greatly increasing risks to all organizations as malware has become a commodity. Signature and heuristic based anti-virus solutions are no longer sufficient. On top of all of this, ransomware attacks have taken centre stage with the largest growth rate; now becoming a top money-maker for hacker groups worldwide.  

In this webinar, you will learn from Wedge Networks, a real-time threat prevention solutions company, about: 

  • The current malware situation and the growth of the ransomware.
  • Anatomy of typical ransomware attack as well as some of the recent high-profile attacks.
  • Real-time Threat Prevention approach and how it is an effective method of STOPPING not only ransomware but also known and unknown malware and targeted attacks; all in real-time.
  • Case studies covering a variety of situations