Houston Feb 20

AWS and Microsoft subject matter experts discuss Generative AI - including LLM Model Comparisons, GenAI Cost Management, RAG Data Architecture, NIST AI Risk Management Framework, AI Chipsets, Responsible AI - plus CyberSecurity/Compliance, Data Analytics/Privacy and Application Modernization/Cloud Migration.

Angelbeat provides a unique opportunity to directly interact with, ask questions to, plus learn from, the world’s leading Cloud/AI firms, in one focused program.

Scroll down to see the confirmed speakers. Click on the name to view their Linkedin profile. Detailed presentation topics for each session will be announced later this month, plus additional speakers.

While the event is designed for on-site attendees, every presentation is also Livestreamed via Zoom, like a regular webinar, for remote/online viewers.

Please use your Angelbeat account - created on the secure Memberspace platform - to signup by clicking the green REGISTRATION button. You are automatically registered for the Zoom LiveStream, and can then request to attend in person (limited to 25 individuals so act quickly). If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.

TIME: 9 am CT until Noon

LOCATION: Houston Crowne Plaza Galleria, 7611 Katy Freeway Houston, Texas 77024. Convenient, Central Location at I-10/610 interchange, Free Parking, Free WiFi


Speakers, Topics, Agenda

9 am CT Ron Gerber, CEO Angelbeat

Angelbeat Overview and Introductory Comments

Ron’s summarizes the day’s agenda, describes how Angelbeat can organize private/custom AI workshops for your organization, and why you should document an Artificial Intelligence Risk Management Framework, based on NIST Standards. Click on image above to watch Gerber’s Videoblog/Podcast the_angel_beat about Top AI Issues in 2025.


9:10 Binu Pazhoor, Senior Solutions Architect, AWS

Amazon SageMaker Unified Studio: An Integrated Experience for All Your Data and AI

As AI and analytics use cases converge, transform how data teams work together with SageMaker Unified Studio.

  • Discover your data and put it to work using familiar AWS tools for complete development workflows, including model development, generative AI app development, data processing, and SQL analytics, in a single governed environment

  • Create projects to collaborate with your teams, securely share AI and analytics artifacts, and access your data stored in Amazon Simple Storage Service (Amazon S3), Redshift, and more sources through Amazon SageMaker Lakehouse


9:40 Speaker TBD

Unlocking AI-Driven Security: Trellix Wise and Amazon Bedrock in Action

In this session, attendees will explore how the integration of Amazon Bedrock telemetry with Trellix XDR delivers unparalleled observability into AI-enabled applications. This integration offers complete visibility into the outputs of generative AI (GenAI) workloads, helping to detect suspicious activities and malicious content. Attendees will also learn how to enforce guardrails around data privacy and promote responsible AI practices, ensuring the safe deployment and management of GenAI in their environments.


10:00 Nate Shea-han, Director Application Innovation, Microsoft

Microsoft OpenAI Generative AI Partnership Update

Learn about all the new innovations on the Microsoft and OpenAI Partnership.

Practical Insights and GenAI Technical Deployment Recommendations

  • AI Data Architecture & Governance: RAG, Data Lakes, Data Privacy

  • Hallucinations/Deepfakes AI-Generated Bad, Wrong, Malicious Output/Content

  • Strategies to Optimize GenAI Output/Content: Prompt Engineering vs Fine Tuning vs Data Labeling

  • Hybrid Orchestrations and Models: LLM vs SLM vs Industry-Specific vs Functional-Specific


10:30 Tom Gore, Sales Director, Arms Cyber

Arms Cyber identifies, neutralizes, and recovers from ransomware threats faster and more effectively than signature-based and behavioral methodologies

Arms Cyber uses a multilayered defense-in-depth approach that combats ransomware at every stage of execution. We transform traditional defenses into a moving maze that disorients and disrupts even the most advanced attackers. From initial intrusion, through attempts at evasion, to malicious payload execution, Arms Cyber provides the defenses that you need but don’t have.