Learn about the latest CyberSecurity innovations and solutions, to address Ransomware, Phishing, Malware, Zero Day, DDoS Attacks, Hybrid/Multi Cloud Vulnerabilities and more. See how AI can dramatically expand the reach and effectiveness of your SOC, to respond to an ever-growing number of alerts. Understand newly emerging threats and data privacy risks tied to GenAI/ChatGPT deployments, including hallucinations and deepfakes. Hear from Microsoft, AWS, Google experts in one focused program.

Date/Time: Nov 7, 1 pm ET, 10 am PT, Start

Scroll down to see the full and detailed agenda, plus expert speakers. Click on their name to view their Linkedin profile, and session title for additional information. There is time for live interaction/Q&A with the speakers so have your questions ready. CPE credit hours are provided.

Please use your Angelbeat account - created on the secure Memberspace platform, at no charge - to register to attend this webinar (hosted on Zoom), which also lets you download slides, watch on-demand videos, plus signup for future programs with one-click. If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.


Speakers, Topics, Agenda


1:05 Astha Naral, CyberSecurity Technical Specialist, Microsoft

Leveraging Generative AI for Enhanced CyberSecurity

Over the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of AI. Defenders are only beginning to recognize and apply the power of generative AI to shift the cybersecurity balance in their favor and keep ahead of adversaries. This session will focus on AI for Cyber Security - Topics covered will be Definitions, How it Works, Use Cases, Threat Detections & Best Practices.


1:25 Alon Levin, VP Product Management, Seraphic Security

Turn any Browser into a Secure Enterprise Browser

The idea behind Seraphic Security was simply that web security could—and should—exist directly in the browser while remaining transparent to the end user. The result is a browser security solution that can transform every commercial web browser into an enterprise browser, for every user on every device, anywhere. This novel approach provides organizations with the threat protection and governance capabilities they need without jeopardizing employee productivity.


1:40 Katherine Schuh, Product Manager, Tufin

Optimizing Cloud Security Architecture: Strategies for Unified Policy Management and Compliance Across AWS, Azure, GCP, and VMware
As organizations increasingly migrate to cloud environments like AWS, Azure, GCP, and VMware, managing security policies has become more complex and challenging. This webinar will explore the key obstacles businesses face in securing multi-cloud and hybrid cloud infrastructure, such as policy fragmentation, lack of visibility across diverse platforms, and maintaining compliance with evolving standards.

Tufin’s Katherine Schuh will share strategies and best practices to overcome these challenges, focusing on optimizing policy management, reducing risk, and ensuring continuous compliance across AWS, Azure, GCP, VMware, and on-premises environments. Attendees will gain actionable insights to enhance visibility and control of their cloud security posture, streamline policy management processes, and unify security policies across all platforms with a single pane of glass.


1:55 John Weidenhammer, Senior Systems Engineer, Cloudbrink

Automated Moving Target Defense (AMTD) Technology: In the face of AI-generated attacks and the burgeoning menace of Cybercrime-as-a-Service (CaaS), traditional security measures are no longer sufficient. The time has come for proactive defense mechanisms that can hold their own against these ever-evolving threats. This is where automated moving-target defense (AMTD) technology comes into play.

John from Cloudbrink will discuss how Cloudbrink's groundbreaking AMTD solution, armed with high-performance Zero Trust Network Access (ZTNA) and dynamic network architecture featuring temporal Points of Presence (POPs) or FAST Edges, is rewriting the rules of cybersecurity. Imagine a security system that keeps attackers guessing with continually changing attack surfaces, data paths, and security certificates - that's AMTD for you.

Manohar Reddy is the Head of Products at Cloudbrink. He brings in 18 years of experience in networking, identity and security domains and worked in senior product management and field CTO roles. His focus currently is to build a high-performance, AI-driven platform that will cater to the work-from-anywhere generation and multi-cloud infrastructure enterprises.


2:10 Tinu Anand, Cloud Strategy Leader, Customer Engineering Manager, Google

Cloud and Data Security in Google Data Centers

Google designed its data centers with security in mind.

Rather than storing each user's data on a single machine or set of machines, we distribute all data — including our own — across many computers in different locations. We then chunk and replicate the data over multiple systems to avoid a single point of failure. We name these data chunks randomly, as an extra measure of security, making them unreadable to the human eye.

While you work, our servers automatically back up your critical data. So when accidents happen — if your computer crashes or gets stolen — you can be up and running again in seconds.

Lastly, we rigorously track the location and status of each hard drive in our data centers. We destroy hard drives that have reached the end of their lives in a thorough, multi-step process to prevent access to the data.


2:30 Dwayne Natwick, CEO/Founder, Captain Hyperscaler

Cybersecurity Training, Awareness, and Education for Technical and Professional Roles within an Organization

Dwayne will explain the differences between training, awareness, and education. He will outline a path for an organization to build a culture of security and risk awareness, amongst both technical and professional staff.


2:45 Avik Mukherjee, Senior Security System Architect, AWS

AWS Security Reference Architecture

The Amazon Web Services (AWS) Security Reference Architecture (AWS SRA) is a holistic set of guidelines for deploying the full complement of AWS security services in a multi-account environment. Learn how to use it to help design, implement, and manage AWS security services so that they align with AWS recommended practices.
These recommendations are built around a single-page architecture that includes AWS security services: how they help achieve security objectives, where they can be best deployed and managed in your AWS accounts, and how they interact with other security services.


3:05 Roger Grimes, Data-Driven Security Evangelist, KnowBe4

Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses

Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses.

But with a strategic approach to cyber defense you can hack the hacker before they strike! Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, exposes the mind of a hacker to help you see your cyber risks from the outside. You’ll learn:

  • How hackers collect “private” details about your organization and your users

  • The most common root causes that lead to damaging cyber attacks

  • Common mistakes made when designing cyber defenses and how to fix them

  • Data-driven strategies for mitigating your biggest weaknesses

  • Why a strong human firewall is your best, last line of defense

Get the details you need to know now to outsmart cybercriminals before you become their next victim.