feb 7 cybersecurity
This webinar will focus on Cybersecurity, covering multiple topics including the ones listed below.
Click on the green button above to register, scroll down to see the full and detailed agenda, plus expert speakers. Click on their name to view their Linkedin profile, and session title for additional information.
Cloud Security Shared Responsibility Model
Zero Trust
Ransomware
Identity Access Management
Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), Extended Detection and Response (XDR)
Security Operations Center (SOC)
Incident Response, SIEM and Alerts
Malware
Phishing
Employee Security Training
Endpoint/Remote User Security, Management, Control
DevSecOps
Application, Kubernetes, Container Security
Data Privacy
Gen AI Security Risks/Threats
AI/ML Tools for Automated Cyberattack Detection, Remediation and Response
Deepfakes: False, Malicious AI-Generated Content
Here is typical and highly positive Angelbeat attendee feedback, this from the IT Director at a global pharmaceutical firm: “All the events that you host are always enjoyable because they are to the point, not a sales pitch and an educational, factual experience.”
Please use your Angelbeat account - created on the secure Memberspace platform, at no charge - to register to attend this webinar (hosted on Zoom), which also lets you download slides, watch on-demand videos, plus signup for future programs with one-click. If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.
If you have any questions email rgerber@angelbeat.com and we will get back to you right away.
We understand that you may attend for only a portion of the webinar, or have to join after the start, that is fine, please still register.
1:05 Martin Holste, Field CTO, Cloud and AI, Trellix
Generative AI/LLM Safety and CyberSecurity: The OWASP Top 10 Vulnerabilities for LLM Apps: It seems there is a new article about AI safety in the media every day. Let’s unpack the myths and questions to truly understand the current state of AI and what it means to digital safety. In this session, we’ll discuss the OWASP Top 10 vulnerabilities for LLM apps and what they mean to organizations, whether they are currently using any AI or not.
1:21 Ari Paul, Director of Product Marketing, Clumio
A Primer on Ransomware Recovery in the Public Cloud: Yes, ransomware does happen in the cloud. The growth and criticality of cloud data has made it an attractive target for attackers. Many organizations still (incorrectly) assume that their data is automatically protected by their cloud provider. And with high-value data powering critical applications, the stakes are higher than ever.
During this informative session Ari from Clumio will break down:
- The anatomy of a public cloud application
- Common attack vectors for cloud data
- What snapshots and replication cannot do
- Real results from customers that switched over to Clumio
1:37 Tracy Walker, Sr. Solution Engineer/Security Specialist, SUSE
Opensource Zero Trust Kubernetes Security Layers: Many CyberSecurity vendors are aggressively - and incorrectly! - tell Kubernetes users that they need to purchase licensed software to secure their clusters.
In this informative and highly relevant session, learn how you can deploy free-to-use, opensource solutions to secure Kubernetes, using zero-trust principles and network-centric (not kernel-centric eBPF) security layers.
Tracy will outline what can and cannot be done with eBPF, in terms of container and Kubernetes security. Opensource options are arguably more effective against zero day attacks and defending unpatched Common Vulnerabilities and Exposures (CVE’s).
1:53 Opengear Joint Presentation
Dan Baxter, Director Sales Engineering, Americas
Ramtin Rampour, Technical Product Engineer
Securing the Unseen: Dan and Ramtin unravel the intricacies of out-of-band management and showcase how Opengear seamlessly integrates with and incorporates the latest security trends. In this compelling and technical session, you’ll learn about these critically important capabilities:
Robust remote management capabilities designed for the era of remote work
Alignment with Zero Trust Architecture for heightened security
Ensured resilience against network failures
Support for secure automation
Facilitation of compliance with data protection regulations
Through compelling real-world case studies and examples, you’ll understand how Opengear paves the way for an enhanced security landscape, that can be easily implemented within your existing IT LAN/WAN architecture without the need for a complete overhaul.
2:09 Bert Bullough, Senior Solutions Architect, AWS
GuardDuty Intelligent Threat Detection: New runtime threat detection capabilities and how this functionality complements existing control plane threat detection.
2:29 Roger Grimes, Data-Driven Defense Evangelist, KnowBe4
Guarding the Cloud: Top Cloud Security Hacks and How You Can Avoid Them: Navigating the cloud security landscape is no walk in the park. It requires IT professionals like you to not only tackle traditional security threats, such as managing data access and mitigating vendor risks, but also confront virtualization risks and tackle issues unique to the cloud.
With more and more programs and information relying on the cloud, maintaining robust security can feel like an uphill battle. Fortunately, Roger A. Grimes, Data-Driven Security Evangelist at KnowBe4, will walk you through the ins and outs of cloud security. He’ll share:
Top Cloud Security Threats
How to approach your organization’s cloud security and threat landscape
Real-world examples of cloud security breaches and their ripple effects
The risks of vendor-stored user data and strategies to prepare your organization for such threats
How to best protect yourself against today's top hacks and vulnerabilities both on and off the cloud