GenAI, Security, Analytics, Cloud March 25
Microsoft, AWS and Google subject matter experts discuss Generative AI - including LLM Model Comparisons, GenAI Cost Management, RAG Data Architecture, NIST AI Risk Management Framework, Responsible AI - plus CyberSecurity/Compliance, Data Analytics/Privacy and Application Modernization/Cloud Migration.
Angelbeat provides a unique opportunity to directly interact with, ask questions to, plus learn from, the world’s leading Cloud/AI firms, in one focused program.
Scroll down to see the full and detailed agenda, plus all the speakers. Click on their name to view their Linkedin profile, and session title for additional information. There is time for live interaction/Q&A with the speakers so have your questions ready. CPE credit hours are provided.
Please use your Angelbeat account - created on the secure Memberspace platform, at no charge - to signup by clicking the green REGISTRATION button. You will be able to register for future programs with one-click, plus join the Angelbeat On-Line Community, where you can download slides and watch on-demand videos, chat with attendees in between events, plus participate in interactive Ask-Me-Anything (AMA) discussions. If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.
TIME: 10 am ET until Noon
Speakers, Topics, Agenda
9 am CT Ron Gerber, CEO Angelbeat
Angelbeat Overview and Introductory Comments
Ron’s summarizes the day’s agenda, describes how Angelbeat can organize private/custom AI workshops for your organization, and why you should document an Artificial Intelligence Risk Management Framework, based on NIST Standards. Click on image above to watch Gerber’s Videoblog/Podcast the_angel_beat about Top AI Issues in 2025.
10:30 Tom Gore, Sales Director, Arms Cyber
Arms Cyber uses a multilayered defense-in-depth approach that combats ransomware at every stage of execution. We transform traditional defenses into a moving maze that disorients and disrupts even the most advanced attackers. From initial intrusion, through attempts at evasion, to malicious payload execution, Arms Cyber provides the defenses that you need but don’t have.