JUN 6 microsoft: generative ai, cLOUD architecture

cybersecurity, data analytics, devops

Learn about the latest Generative AI, Cloud, Security, Data Analytics, Kubernetes, DevOps and other innovations on the Microsoft platform.

Click on the green button above to register, scroll down to see the agenda, speakers and topics. Click on their name to view their Linkedin profile, and session title for additional information. There is time for live interaction/Q&A with the speakers so have your questions ready.

We understand that you may attend for only a portion of the webinar, or have to join after the start, that is fine, please still register.

Here is typical and highly positive Angelbeat attendee feedback, this from the IT Director at a global pharmaceutical firm: “All the events that you host are always enjoyable because they are to the point, not a sales pitch and an educational, factual experience.”

Please use your Angelbeat account - created on the secure Memberspace platform, at no charge - to register to attend this webinar (hosted on Zoom), which also lets you download slides, watch on-demand videos, plus signup for future programs with one-click. If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.


Speakers, Topics, Agenda



1:20 Dee Kumar, Principal Cloud Solution Architect, Data & AI, Microsoft

Leverage the Microsoft Fabric to Bring your Data into the Era of AI: Reshape how everyone accesses, manages, and acts on data with a single, AI-powered platform.


1:35 Microsoft

Generative AI and CyberSecurity Issues and Solutions, for Public Sector Organizations: Over the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of AI. Defenders are only beginning to recognize and apply the power of generative AI to shift the cybersecurity balance in their favor and keep ahead of adversaries. This session will focus on AI for Cyber Security - Topics covered will be Definitions, How it Works, Use Cases, Threat Detections & Best Practices.