May 13 GenAI, Security, Analytics, Cloud: Philadelphia

AWS and other subject matter experts discuss Generative AI - including LLM Model Comparisons, RAG Data Architecture, Fine Tuning vs Prompt Engineering, AI Inference Training, Responsible AI - plus CyberSecurity, Compliance, Privacy and Analytics.

Scroll down to see the detailed agenda and speakers. Click on the name to view their Linkedin profile, and session title for additional information. CPE credit hours are provided.

While the event is designed for on-site attendees from Philadelphia, Wilmington and South Jersey, all presentations are Livestreamed via Zoom - like a regular webinar - so remote viewers won’t miss a thing.

TIME: 8:45 am ET until Noon

Location: Hyatt House Hotel King of Prussia, 240 Mall Boulevard, King of Prussia, PA 19406. Easy access off major highways, Free Parking and WiFi.

Use your Angelbeat account - created on the secure Memberspace platform - to signup by clicking the green REGISTRATION button. You are automatically registered for the Zoom LiveStream, and can then request to attend in person (limited to 25 individuals so act quickly). If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.

Speakers, Topics, Agenda


8:30 - 9:30 am ET Registration, Coffee, Snacks, Networking with Peers and Speakers


9:30 Event Overview, Introductory Comments, NIST AI Risk Management Framework (RMF)

Ron Gerber, CEO Angelbeat

Ron’s summarizes the day’s agenda, describes how Angelbeat can organize private/custom AI workshops for your organization, and why you should document an Artificial Intelligence Risk Management Framework, based on NIST Standards. Click on image above to watch Gerber’s Videoblog/Podcast the_angel_beat about Top AI Issues in 2025.


9:40 Amazon SageMaker: The Center for All Your Data, Analytics, AI Needs

John O’Donnell, Principal Solution Architect, AWS

John will explore the next generation of Amazon SageMaker, now evolving to become the comprehensive center for all your data, analytics, and AI needs. He will demonstrate how SageMaker addresses today's most pressing challenges through three key innovations:

  • Unified Studio development environment that brings together all your tools and resources in one place

  • SageMaker Lakehouse that provides a unified and open data foundation with zero-ETL capabilities

  • Robust Data & AI Governance features to ensure security and compliance.

With 89% of CDOs pursuing GenAI initiatives but 52% concerned about their data foundation readiness, this webinar offers timely solutions for organizations looking to overcome data silos, integrate analytics with AI, and scale with operational excellence.


10:00 Amazon Q: Transforming Business Productivity and Development with Generative AI

Nick McCabe, Senior Solutions Architect, AWS

Join us for an immersive session exploring Amazon Q, AWS's powerful AI-powered assistant that's revolutionizing both business operations and software development. In this comprehensive overview and demonstration, you'll discover how Amazon Q serves as a dual-purpose solution, enhancing productivity across your organization.

Learn how business users can leverage Q to analyze data, generate insights, and streamline daily workflows, while developers can accelerate coding, troubleshoot issues, and optimize their development processes. Nick will showcase real-world applications, live demonstrations, and practical use cases that highlight Q's capabilities.


10:20 Amazon Bedrock: The easiest way to build and scale generative AI applications with foundation models

Victor Feinman, Senior Solutions Architect, AWS

Amazon Bedrock is a fully managed service that offers a choice of high-performing foundation models (FMs) from leading AI companies like AI21 Labs, Anthropic, Cohere, DeepSeek, Luma, Meta, Mistral AI, Stability AI, and Amazon Nova through a single API, along with a broad set of capabilities you need to build generative AI applications with security, privacy, and responsible AI.

Using Amazon Bedrock, you can easily experiment with and evaluate top FMs for your use case, privately customize them with your data using techniques such as fine-tuning and Retrieval Augmented Generation (RAG), and build agents that execute tasks using your enterprise systems and data sources.

Since Amazon Bedrock is serverless, you don't have to manage any infrastructure, and you can securely integrate and deploy generative AI capabilities into your applications using the AWS services you are already familiar with.


10:40 Building on Bedrock: AI Security for the Future with Amazon Bedrock and Trellix Wise

Taylor Mullins, Senior Solutions Architect, Trellix

 In this session we will explore how combining the robust infrastructure of Amazon Bedrock with the advanced security technology of Trellix Wise create a modern, scalable solution for protecting against evolving cyber threats. Learn how this powerful combination accelerates AI adoption, enhances real-time threat intelligence, and ensures proactive defense, all while offering flexibility, scalability, and protection of your sensitive data. Through real-world examples, we'll demonstrate how Trellix Wise on Amazon Bedrock builds a secure environment that’s as reliable as Bedrock, yet as innovative as the future envisioned by the Jetsons.


11:00 Hacking the Hacker: Assessing and Addressing Your Organization’s Cyber Defense Weaknesses

Roger Grimes, Data-Driven Security Evangelist, KnowBe4

Cybercriminals are out there, watching and waiting for the perfect opportunity. They are gathering information about your organization and users, devising the perfect plan to infiltrate your defenses.

But with a strategic approach to cyber defense you can hack the hacker before they strike! Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, exposes the mind of a hacker to help you see your cyber risks from the outside. You’ll learn:

  • How hackers collect “private” details about your organization and your users

  • The most common root causes that lead to damaging cyber attacks

  • Common mistakes made when designing cyber defenses and how to fix them

  • Data-driven strategies for mitigating your biggest weaknesses

  • Why a strong human firewall is your best, last line of defense

Get the details you need to know now to outsmart cybercriminals before you become their next victim.