Highlight Topics
- Leveraging AI for Defense
- Balancing Privacy and Compliance
- Secure AI Integration
- Combatting Threats With AI
- Diverse Industry AI Applications
The ISMG’s Cybersecurity Implications of AI: North America West Summit offers a comprehensive exploration of AI’s impact on cybersecurity, focusing on ethical considerations, securing LLMs, and the implications for privacy and intellectual property. Participants will engage with industry leaders on the collaboration of human intelligence and AI to enhance cybersecurity measures, including AI-powered threat detection and risk mitigation strategies. The summit provides CISOs with essential insights into AI, encouraging transparent governance and hands-on application through a Solution Room Workshop, designed to tackle real-world cybersecurity challenges. This event promises a day filled with strategic discussions, invaluable insights, and collaborative exploration at the cutting edge of AI and cybersecurity.
View our ISMG Event Experience video to see what your peers are saying about their participation.
11100 NE 6th St, Bellevue, WA 98004
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats
These industry leaders will share their direct experiences, focusing on the transformative role AI plays in enhancing security measures, the challenges of integrating AI into existing frameworks, and the innovative strategies developed to mitigate associated risks.
In this exclusive discussion, panelists will dissect specific instances where AI technologies were leveraged to detect threats, streamline incident response, and predict vulnerabilities within their organizations. The discussion will navigate through the complexities of AI adoption, spotlighting the critical balance between leveraging AI for its groundbreaking potential and addressing the ethical, technical, and security challenges it introduces.
Attendees will leave with a comprehensive perspective on strategic AI integration, including:
Nicole Darden Ford, CISO, Nordstrom
David Tsao, CISO, Instacart
Suha Can, CISO, Grammarly
As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy.
This session addresses the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session serves as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations. Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, our discussion aims to shape a responsible and privacy-conscious approach to AI deployment.
Key Discussion Points:
Ginger Armbruster, Chief Privacy Officer and IT Division Director, City of Seattle
Ojas Rege, GM, Privacy and Data Governance Cloud, OneTrust
Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory
Highlighting the task force’s mandate, he will delve into the critical areas of public policy and the importance of maintaining racial equity and civil liberties in the face of AI advancements. Ferguson’s talk will also touch on the broader context of AI regulation and innovation, reflecting on how the task force’s work compares with similar efforts in other states and addresses the unique challenges and opportunities presented by AI technologies.
The session promises insightful perspectives on proactive governance and the role of bipartisan collaboration in shaping the future of AI in Washington and beyond.
Bob Ferguson, Attorney General, Washington State
Featuring insights from Kayne McGladrey, Field CISO at Hyperproof, and Casey Allen, CIO at Concentric, this discussion will navigate through the intricate landscape of legal, ethical, and technological considerations. From the ramifications of the Karl Lundstrom case for the tech industry to the transformative potential of GPTs in shaping privacy policies and frameworks, the panel will explore pivotal themes shaping the future of privacy and security.
Key Discussion Points:
• Legal and Ethical Implications: Analyze the broader impacts of high-profile legal cases on the tech industry’s approach to AI tool utilization and data privacy, offering guidance for mitigating internal risks.
• Harnessing GPTs for Privacy Governance: Discuss the role of Generative Pre-trained Transformers (GPTs) in revolutionizing privacy policy generation and compliance, and their potential to embed privacy by design into the DNA of organizations.
• Proactive Privacy Strategies: Explore methodologies for ‘shifting privacy left,’ ensuring privacy considerations are integral to the early phases of system development and deployment.
• Innovative Approaches to Privacy Enhancement: Uncover quick wins and strategic initiatives that leading companies are implementing to bolster user privacy, setting new standards for privacy protection in the digital age.
Attendees will leave with a comprehensive understanding of how to navigate the complex interplay between advancing security initiatives and upholding privacy principles, equipped with practical strategies and insights from the forefront of cybersecurity and privacy innovation.
Kayne McGladrey, Field CISO, Hyperproof
Casey Allen, CIO, Concentric
Organizations are left balancing the benefits of the new tech for keeping pace with cyber threats, with the risk of the untested and unknown.
Jake Gillen, Principal Solutions Architect, Expel
Be first in the kill chain without relying on known signature-based attacks, analyzing sandboxed traffic, maintaining an army of security analysts, or being vulnerable to misconfigured systems. Leverage advanced AI/ML models to block connections to malicious domains, rendering malware, phishing, and lookalike domains useless.
Tom Guerrette, Cyber Security Engineer, Infoblox
Greg Simmons, Cyber Security Specialist, Infoblox
Recent trends demonstrate adversaries utilizing AI for complex phishing campaigns, leveraging deepfake technology for identity fraud, and automating vulnerability exploitation. This session focuses on how security leaders can utilize AI technologies to enhance defense capabilities, showcasing AI’s dual potential as both a tool for attackers and a powerful ally in cybersecurity.
Key Session Insights:
Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory
Chuck Markarian, CISO, PACCAR
Eric Sanchez, CISO, Kyowa Kirin, Inc.- U.S.
Adam Zoller, CISO, Providence
This session addresses the complexities of deploying AI models securely, emphasizing the critical role of artificial intelligence bill of materials, or AIBOMs, in ensuring security, trust, and accuracy.
AIBOMs provide a detailed inventory of components, data sets, and environments involved in AI model development, crucial for oversight and control, especially for third-party AI applications. Unlike Unlike software bills of materials – or SBOMs, AIBOMs include data lineage, model training parameters, and ethical considerations, offering a comprehensive view essential for maintaining transparency and trust.
This exploration into AIBOMs will highlight their importance in an organization’s security posture, detailing practical steps for AI due diligence and third-party AI platform evaluation. The discussion aims to build trust in AI through a focus on technological robustness and the continuous assurance of model accuracy and ethical deployment.
Key Session Insights:
Heather West, Senior Director, Cybersecurity and Privacy Services, Venable
Jon Washburn, CISO, Stoel Rives
Nathan Shaffer, Partner; Intellectual Property Litigator, Orrick Herrington & Sutcliffe
What You Will Gain From This Experience
Nader Zaveri, Senior Manager – Incident Response & Remediation, Mandiant
Paul Vanderwulp, Special Agent, United States Secret Service
the backdrop of recent inquiries by entities such as the NTIA into the risks and benefits of publicly available model weights, this discussion is timely and essential for information security leaders.
As organizations navigate the decision between open platforms and open-source models, understanding the unique security challenges and opportunities each presents is paramount. This session aims to demystify these distinctions, providing CISOs, CIOs, and VPs of Information Security with a clear road map for assessing and integrating LLM technologies securely into their operations.
Key Takeaways:
Heather West, Senior Director, Cybersecurity and Privacy Services, Venable
Vinit Tople, Fmr. Head of Gen AI Product Portfolio, Alexa Automotive, Amazon
In this open and candid discussion, esteemed information security leaders from diverse fields will offer a panoramic view of AI’s impact across the business spectrum. Participants will benefit from an in-depth exploration of how different industries are not only utilizing AI but also navigating the complexities of its adoption, with a special focus on the lessons learned in the process.
Our closing panel will unveil the nuances of AI integration within their sectors, shedding light on how AI technologies have been implemented to optimize operations, enhance customer experiences, and bolster security postures against increasingly sophisticated threats. More importantly, this session aims to distill the collective experiences of these industry leaders into actionable insights, highlighting the common hurdles encountered during AI adoption, from ethical dilemmas and regulatory challenges to technical obstacles and workforce implications.
Key Session Insights:
Jon Washburn, CISO, Stoel Rives
Erika Voss, Vice President, Information Security, DAT Freight & Analytics
Eric Sanchez, CISO, Kyowa Kirin, Inc.- U.S.
Upcoming ISMG Events
RSVP here to attend our events. You can opt for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.