Aug 12: CyberSecurity & AI-Powered Threats: Combat Deepfakes, Malware, Ransomware, Zero Day Attacks in the Modern SOC
Cyber threats are evolving faster than ever—driven by artificial intelligence, automation, and the growing sophistication of threat actors, hackers and cybercriminals. Join cybersecurity experts from AWS, Google, Microsoft, Trellix, KnowBe4 and other industry leaders for a timely discussion on how organizations can defend against today’s most pressing threats: Deepfakes, Malware, Ransomware and AI-powered Zero Day Attacks. Angelbeat provides a unique opportunity to directly interact with, ask questions to, plus learn from, the world’s leading Cloud/AI/Security firms, in one focused program.
We’ll uncover how AI is a tool used by both attackers and defenders. Learn how to recognize the signs of synthetic media attacks, covert delivery (plus detection/removal) of malware, identification of AI-generated deepfakes that can inflict serious damage to your organizational reputation, and ransomware evolution in the AI/Cloud era. Learn about the latest hacking techniques used by cybercriminals - and actions you should take to protect confidential data and mission critical applications. See how AI can dramatically increase the efficiency and effectiveness of your SOC and CyberSecurity staff in responding to alerts. Gain insights into how the concept of “Responsible AI” can be deployed within your company. We’ll also explore how to build resilience through the human factor and integrated user awareness training for your last line of defense - your employees.
Use your Angelbeat account - created on the secure Memberspace platform - to register to attend this webinar, hosted on Zoom, by clicking the green REGISTER button. If you already have an account, you are asked to confirm your registration with one click. Otherwise you are prompted to fill out a simple contact form.
The speakers are listed below. Click on the name to view their Linkedin profile. CPE credit hours are provided.
The webinar starts at 11 am ET and continues until 1 pm ET, for two hours.
11:00 am ET Ron Gerber, CEO Angelbeat
Event Overview, Custom AI Workshops
Ron’s summarizes the day’s agenda and describes how Angelbeat can organize private/custom AI workshops for your organization. Click here to watch Gerber’s Videoblog/Podcast the_angel_beat about Top AI Issues in 2025.
Balamurugan Balakreshnan, Chief AI Officer, Microsoft
Learn about the six principles that Microsoft’s believes should guide AI development and use
1) Fairness 2) Reliability and Safety 3) Privacy and Security 4) Inclusiveness 5) Transparency 6) Accountability
Pete Buonora, Principal Solutions Architect, AWS
Chad Lorenc, Security Practice Manager, AWS
As AI becomes more deeply embedded across infrastructure, applications, and supply chains throughout our customers' businesses, security becomes more critical. Organizations can protect AI workloads using AWS security tools they already know and trust. Rather than reinventing security, teams can extend their existing AWS security expertise to enable rapid innovation with built-in protection. This security-by-design approach is critical because AI is embedding throughout the technology stack, requiring consistent controls and automated guardrails at every integration point. By leveraging familiar tools, organizations can accelerate AI adoption on AWS while maintaining enterprise-grade security that scales automatically as they grow. The result is faster innovation without compromise – teams can build and deploy AI solutions confidently, protected by continuous compliance and automated controls they already understand and trust.
Jeff Meacham, Global AWS Solutions Architect, Trellix
Endpoint Security through Automation, Threat Intelligence, AI-Driven Insights
This session explores how Trellix is transforming endpoint security through automation, threat intelligence, and AI-driven insights. It highlights the growing complexity and volume of endpoint threats, the increasing burnout among security teams, and how tools like Trellix Wise and EDR with Forensics help contain attacks, accelerate investigations, and reduce analyst workload. You'll learn how Trellix delivers visibility and control before, during, and after an attack—while enabling smarter, faster response at scale.
Abhijeet Rajwade, Senior Customer Engineer, Google
Secure AI Framework (SAIF) for Safeguarding AI Innovations
As the industry transitions to Agentic AI, safeguarding your AI innovations is crucial. This session will cover Google's framework for securing AI workloads, identifying risks, exploring industry trends, and showcasing Google's AI Security offerings, including the Secure AI Framework (SAIF).
SAIF.Google is a new resource hub to help security professionals navigate the evolving landscape of AI security. It provides a collection of AI security risks and controls, including a 'Risk Self-Assessment Report’ to guide practitioners in understanding risks that could affect them and how to implement SAIF in their organizations. These resources will help address the critical need to build and deploy secure AI systems in a rapidly evolving world of AI.
Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses
Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses. But with a strategic approach to cyber defense you can hack the hacker before they strike! In this session, we'll share insights into their strategies and their motivations. You’ll learn how to use that understanding, along with simple strategies to make your organization a hard target. Join Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, as he exposes the mind of a hacker to help you see your cyber risks from the outside in. In this session you’ll learn:
How hackers collect “private” details about your organization and your users
The most common root causes that lead to damaging cyber attacks
Common mistakes made when designing cyber defenses and how to fix them
Data-driven strategies for mitigating your biggest weaknesses
Why a strong human firewall is your best, last line of defense
Get the details you need to know now to outsmart cybercriminals before you become their next victim.