September 25 CyberSecurity and AI-Powered Threats & Solutions: Combat Malware, Ransomware, Zero Day Attacks, Prompt Injection Attacks and More in the Modern SOC
Cyber threats are evolving faster than ever—driven by AI, ML, automation, and the growing sophistication of threat actors, hackers and cybercriminals. Join cybersecurity experts from AWS, Google, Microsoft and Trellix for a timely discussion today’s most pressing threats listed below. Angelbeat provides a unique opportunity to directly interact with, and ask questions to, Security/Cloud/AI experts from the world’s leading organizations, in one focused program.
Learn how to recognize the signs of synthetic media attacks, covert delivery (plus detection/removal) of malware, and ransomware evolution in the AI/Cloud era.
Gain insights into the latest hacking techniques used by cybercriminals - and actions you should take to protect confidential data and mission critical applications.
See how AI can dramatically increase the efficiency and effectiveness of your SOC and CyberSecurity staff in responding to alerts.
Understand how the concept of “Responsible AI” can be implemented within your organization.
Configure auto-remediation tools to expose and correct vulnerabilities and compliance risks in AI-Generated Code
Deploy LLM Guardrails, data input/output monitoring, adaptive data classification, prompt injection protection to secure AI applications and ensure Data Privacy compliance.
Use your Angelbeat account - created on the secure Memberspace platform - to register to attend this webinar, hosted on Zoom, by clicking the green REGISTER button. If you already have an account, you are asked to confirm your registration with one click. Otherwise you are prompted to fill out a simple contact form.
The speakers are listed below. Click on the name to view their Linkedin profile. CPE credit hours are provided.
The webinar starts at 1 pm ET and continues until 3 pm ET, for two hours.
BK Arashanapalli, Field CTO, Google
Google Cloud’s approach to Responsible AI & the Secure AI Framework (SAIF)
At Google, we recognize that powerful generative AI technologies raise equally powerful questions about its use and impact on society for many years to come, and we feel a deep responsibility to get this right. In this session, BK will share Google Cloud's vision for Responsible Generative AI, highlighting the Secure AI Framework (SAIF) as a cornerstone for building secure-by-design AI systems and innovating with confidence.
Brian Benz, Principal AI Advocate, Microsoft
Brian will cover the 6 main pillars of Microsoft’s Secure Future Initiative – Secure by Design
Protect identities and secrets
Protect tenants and isolate systems
Protect networks
Protect engineering systems
Monitor and detect cyberthreats
Accelerate response and remediation
Tom Gore, Sales Director, Arms Cyber
Arms Cyber uses a multilayered defense-in-depth approach that combats ransomware at every stage of execution. We transform traditional defenses into a moving maze that disorients and disrupts even the most advanced attackers. From initial intrusion, through attempts at evasion, to malicious payload execution, Arms Cyber provides the defenses that you need but don’t have.
De'Shedric Boler, Solutions Architect, AWS
AWS approach to Responsible AI: From theory to practice
At AWS, we define responsible AI using a core set of dimensions that we assess and update over time as AI technology evolves. Responsible AI is the practice of designing, developing, and using AI technology with the goal of maximizing benefits and minimizing risk. My presentation will cover these three important topics:
What is responsible AI?
Responsible AI at AWS
Responsible AI in practice
Jeff Meacham, Global AWS Solutions Architect, Trellix
Preventing AI-Driven Data Leaks in Organizations
Generative AI is rapidly transforming business operations, yet its adoption also introduces new risks to sensitive data. This session will explore how Trellix Wise and our comprehensive Data Security solutions can help organizations effectively safeguard their information. We will delve into strategies such as robust policy enforcement, adaptive data classification, and real-time monitoring, all of which are crucial for enabling secure and confident AI adoption.