September 25 CyberSecurity and AI-Powered Threats & Solutions: Combat Malware, Ransomware, Zero Day Attacks, Prompt Injection Attacks and More in the Modern SOC

Cyber threats are evolving faster than ever—driven by AI, ML, automation, and the growing sophistication of threat actors, hackers and cybercriminals. Join cybersecurity experts from AWS, Google, Microsoft and Trellix for a timely discussion today’s most pressing threats listed below. Angelbeat provides a unique opportunity to directly interact with, and ask questions to, Security/Cloud/AI experts from the world’s leading organizations, in one focused program.

  • Learn how to recognize the signs of synthetic media attacks, covert delivery (plus detection/removal) of malware, and ransomware evolution in the AI/Cloud era.

  • Gain insights into the latest hacking techniques used by cybercriminals - and actions you should take to protect confidential data and mission critical applications.

  • See how AI can dramatically increase the efficiency and effectiveness of your SOC and CyberSecurity staff in responding to alerts.

  • Understand how the concept of “Responsible AI” can be implemented within your organization.

  • Configure auto-remediation tools to expose and correct vulnerabilities and compliance risks in AI-Generated Code

  • Deploy LLM Guardrails, data input/output monitoring, adaptive data classification, prompt injection protection to secure AI applications and ensure Data Privacy compliance.

Use your Angelbeat account - created on the secure Memberspace platform - to register to attend this webinar, hosted on Zoom, by clicking the green REGISTER button. If you already have an account, you are asked to confirm your registration with one click. Otherwise you are prompted to fill out a simple contact form.

The speakers are listed below. Click on the name to view their Linkedin profile. CPE credit hours are provided.

The webinar starts at 1 pm ET and continues until 3 pm ET, for two hours.



BK Arashanapalli, Field CTO, Google

Google Cloud’s approach to Responsible AI & the Secure AI Framework (SAIF)

At Google, we recognize that powerful generative AI technologies raise equally powerful questions about its use and impact on society for many years to come, and we feel a deep responsibility to get this right. In this session, BK will share Google Cloud's vision for Responsible Generative AI, highlighting the Secure AI Framework (SAIF) as a cornerstone for building secure-by-design AI systems and innovating with confidence.


Brian Benz, Principal AI Advocate, Microsoft

Brian will cover the 6 main pillars of Microsoft’s Secure Future Initiative – Secure by Design

  • Protect identities and secrets

  • Protect tenants and isolate systems

  • Protect networks

  • Protect engineering systems

  • Monitor and detect cyberthreats

  • Accelerate response and remediation


Tom Gore, Sales Director, Arms Cyber

Arms Cyber uses a multilayered defense-in-depth approach that combats ransomware at every stage of execution. We transform traditional defenses into a moving maze that disorients and disrupts even the most advanced attackers. From initial intrusion, through attempts at evasion, to malicious payload execution, Arms Cyber provides the defenses that you need but don’t have.


De'Shedric Boler, Solutions Architect, AWS

AWS approach to Responsible AI: From theory to practice 

At AWS, we define responsible AI using a core set of dimensions that we assess and update over time as AI technology evolves. Responsible AI is the practice of designing, developing, and using AI technology with the goal of maximizing benefits and minimizing risk. My presentation will cover these three important topics:

  • What is responsible AI?

  • Responsible AI at AWS

  • Responsible AI in practice


Jeff Meacham, Global AWS Solutions Architect, Trellix

Preventing AI-Driven Data Leaks in Organizations

Generative AI is rapidly transforming business operations, yet its adoption also introduces new risks to sensitive data. This session will explore how Trellix Wise and our comprehensive Data Security solutions can help organizations effectively safeguard their information. We will delve into strategies such as robust policy enforcement, adaptive data classification, and real-time monitoring, all of which are crucial for enabling secure and confident AI adoption.