june 20 cybersecurity

This webinar will focus on Cybersecurity, covering many high-priority topics listed below.

Click on the green button above to register, scroll down to see the agenda, speakers and topics. Click on their name to view their Linkedin profile, and session title for additional information. There is time for live interaction/Q&A with the speakers so have your questions ready.

We understand that you may attend for only a portion of the webinar, or have to join after the start, that is fine, please still register.

Here is typical and highly positive Angelbeat attendee feedback, this from the IT Director at a global pharmaceutical firm: “All the events that you host are always enjoyable because they are to the point, not a sales pitch and an educational, factual experience.”

Please use your Angelbeat account - created on the secure Memberspace platform, at no charge - to register to attend this webinar (hosted on Zoom), which also lets you download slides, watch on-demand videos, plus signup for future programs with one-click. If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.

  • Cloud Security Shared Responsibility Model

  • Zero Trust

  • Ransomware

  • Endpoint Detection and Response (EDR), Managed Detection and Response (MDR), Extended Detection and Response (XDR)

  • Security Operations Center (SOC)

  • Incident Response, SIEM and Alerts

  • Malware and Phishing Attacks

  • Endpoint/Remote User Security, Management, Control

  • GenAI Security, AI/ML Tools for Automated Cyberattack Detection, Remediation and Response

Speakers, Topics, Agenda


1:05 Martin Holste, Field CTO, Cloud and AI, Trellix

Cloud Security, Unparalleled Protection and Productivity Across your Organization. Elevate your security with cloud-delivered infrastructure solutions to stay safe, no matter where your assets are located. You’ll get complete visibility, proactive protection, and scalability to fuel growth and optimize costs.


1:20 Matt Slotten, Principal Solutions Architect, Cloud-Native Technical Partnerships, Veeam

Data Protection and Mobility for Cloud Native Workloads: Learn about Kubernetes native data protection, which enables seamless backup and restore, disaster recovery, and application mobility for Kubernetes applications at scale. With Veeam, teams also achieve radical resilience against ransomware attacks.


1:35  AWS

AWS Cloud Security: Strong security at the core of an organization enables digital transformation and innovation. AWS helps organizations to develop and evolve security, identity, and compliance into key business enablers. At AWS, security is our top priority. AWS is architected to be the most secure global cloud infrastructure on which to build, migrate, and manage applications and workloads. This is backed by our deep set of 300 security services and features and the trust of our millions of customers, including the most security sensitive organizations like government, healthcare, and financial services.


1:50 Microsoft

Generative AI and CyberSecurity Issues and Solutions: Over the last year, the speed, scale, and sophistication of attacks has increased alongside the rapid development and adoption of AI. Defenders are only beginning to recognize and apply the power of generative AI to shift the cybersecurity balance in their favor and keep ahead of adversaries. This session will focus on AI for Cyber Security - Topics covered will be Definitions, How it Works, Use Cases, Threat Detections & Best Practices.