june 20 cybersecurity

This webinar will focus on Cybersecurity, featuring AWS and other industry leaders.

Click on the green button above to register, scroll down to see the full agenda, speakers and topics. Click on their name to view their Linkedin profile, and session title for additional information. There is time for live interaction/Q&A with the speakers so have your questions ready.

Here is typical and highly positive Angelbeat attendee feedback, this from the IT Director at a global pharmaceutical firm: “All the events that you host are always enjoyable because they are to the point, not a sales pitch and an educational, factual experience.”

Please use your Angelbeat account - created on the secure Memberspace platform, at no charge - to register to attend this webinar (hosted on Zoom), which also lets you download slides, watch on-demand videos, plus signup for future programs with one-click. If you already have an account, you will be asked to confirm your registration. Otherwise you are prompted to fill out a simple contact form.

Speakers, Topics, Agenda


2:05 Randy Lee, Senior Systems Engineer, Veeam

CyberSecurity Alignment with Data Protection and Backup for Optimal Protection, Data Security and Ransomware Recovery:

Secure backup is critical to your cyber resiliency and data security. Learn about Veeam’s multi-layered protection, designed for peace of mind across your hybrid cloud.

Ransomware remains an ongoing, if not growing threat, in today’s cybersecurity risk landscape. Veeam offers backup and resiliency in the event of a ransomware attack, which will significantly reduce overall risk while accelerating recovery with zero data loss.


2:25 Aastha Bhardwaj, Senior Security Specialist, AWS

AWS Cloud Security: Strong security at the core of an organization enables digital transformation and innovation. AWS helps organizations to develop and evolve security, identity, and compliance into key business enablers. At AWS, security is our top priority. AWS is architected to be the most secure global cloud infrastructure on which to build, migrate, and manage applications and workloads. This is backed by our deep set of 300 security services and features and the trust of our millions of customers, including the most security sensitive organizations like government, healthcare, and financial services.


2:40 Syed Sanoor, Solutions Architect, AWS

Creating an Integrated IT/OT CyberSecurity Platform, to Protect IoT Applications: Learn how to create am Integrated IT/OT (Information and Operational Technology) CyberSecurity Strategy to Protect IoT Applications.


2:55 Zachary Krider, Director of Strategy & AI, Trellix

Understanding Advanced Persistent Threats (APT) and Building Cybersecurity Resilience in a Complex World: This informative and highly relevant session focuses on the top APT activity that Trellix has identified in the past six months, targeting the US and most often coming from the big four (Russia, Iran, China, North Korea)

Zachary will illustrate how spikes in APT activity correlate with global events, the growing risk of APT’s, and how organizations can leverage Trellix’s capabilities to protect their confidential data and mission critical applications against APT’s.


3:15 Jorn Knuttila, Senior Domain Solution Architect - Kubernetes Security & Compliance, SUSE

Opensource Zero Trust Kubernetes Security Layers: Many CyberSecurity vendors are aggressively - and incorrectly! - tell Kubernetes users that they need to purchase licensed software to secure their clusters.

In this informative, interactive and highly relevant session, learn how you can deploy free-to-use, opensource solutions to secure Kubernetes, using zero-trust principles and network-centric (not kernel-centric eBPF) security layers.

Tracy will outline what can and cannot be done with eBPF, in terms of container and Kubernetes security. Opensource options are arguably more effective against zero day attacks and defending unpatched Common Vulnerabilities and Exposures (CVE’s).