february 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

9:55 - 15:40 CET | Virtual Event

Event Overview

The 2025 ISMG Virtual AI Security Summit is the ultimate digital gathering for cybersecurity leaders and AI innovators, offering unique case studies into how artificial intelligence is transforming security strategies across diverse sectors. This global summit will feature actionable perspectives from top industry experts, exploring AI’s role in shaping the future of threat defense and identity protection.

Attendees will gain insights into how AI is not only being weaponized by cybercriminals but also driving innovations in identity verification, supply chain security, and the integration of advanced computing technologies to counter increasingly sophisticated threats. Sessions will explore real-world applications, tackle pressing ethical challenges, and offer a roadmap for navigating the complexities of AI-driven cybersecurity.

Gain the strategies and knowledge necessary to fortify your defenses and stay ahead of AI’s transformative impact on information security. Join us for unparalleled access to a global brain trust of thought leadership at the cutting edge of cybersecurity and machine learning.

 

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

  • Exploring AI-Driven Malware Threats and Defense Strategies
  • Mitigating Risks from Large Language Models (LLMs)
  • Ethical and Regulatory Challenges of AI in Cybersecurity
  • AI-Powered Threat Detection and Automated Incident Response

Kush Sharma

Director, Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario

Dr. Denise Turley

Vice President, Corporate Systems | Leading AI Implementation, U.S. Chamber of Commerce

Sergio Trindade

CISO, Águas do Tejo Atlântico

Patrick Bangert

VP and Chief of AI, Oxy

Noah Ringler

Artificial Intelligence Policy Lead, U.S. Department of Homeland Security

Rick Doten

VP, CISO, Information Security, Centene Corporation, Carolina Complete Health

Mike Manrod

CISO, Grand Canyon Education

Andres Andreu

Deputy CISO, Hearst

Sergio Gago

Managing Director, AI and Quantum, Moody's Analytics

Phillip Davies

CISO, Equifax UK

Pedro Tavares

Lead Data Scientist, Glencore

Jeremy Grant

Managing Director, Technology Business Strategy, Venable LLP

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda

Opening Comments

Virtual AI Summit

A Roadmap for New Terrain: Strategic Insights From CISA's CIO Robert Costello

Costello will share insight from CISA’s strategic action plan, which focuses on responsible AI use, securing AI systems and mitigating AI-related threats to critical infrastructure. Additionally, the discussion will highlight the evolving cyber risks and how AI can be leveraged to enhance national security. Attendees will also learn how their organizations can utilize AI to enhance their cybersecurity posture, with insights into CISA’s available resources and collaborative opportunities. This is a unique opportunity for information security practitioners in government to gain valuable insights from one of the leading voices in the field.

Key takeaways:

  • Detailed understanding of CISA’s AI road map: Learn the specific steps and timelines in CISA’s comprehensive plan for integrating AI into national cybersecurity efforts, including key initiatives and expected outcomes. 
  • Best Practices for secure AI system development: Gain in-depth knowledge of CISA’s guidelines for secure AI system development, including specific risk mitigation techniques, compliance requirements, and examples of successful implementation. 
  • Advanced strategies to protect critical infrastructure: Discover CISA’s latest strategies for using AI to defend against sophisticated threats targeting critical infrastructure, with real-world examples, actionable recommendations, and insights into collaboration with international partners and private sector stakeholders. 
  • Leveraging AI for enhanced cybersecurity: Explore how organizations can implement AI to improve their cybersecurity posture, utilizing resources and guidance from CISA to stay ahead of emerging threats and enhance overall cyber resilience. 

Robert Costello, Chief Information Officer, CISA

Kush Sharma

Director Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario

Dr. Denise Turley

Vice President, Corporate Systems | Leading AI Implementation, U.S. Chamber of Commerce

Sergio Trindade

CISO, Águas do Tejo Atlântico

AI Value Simplified: Communicating Impact and ROI to the Board

Despite the demonstrated value of AI, especially Generative AI, conveying its benefits to the board effectively remains a significant challenge. This difficulty often starts even before the AI is implemented, with the need to upsell its potential value. Setting realistic expectations and choosing metrics and KPIs that align with business objectives are crucial for accurately measuring AI performance and impact. This session will delve into the key aspects of evaluating AI initiatives and effectively communicating their value to the board, ensuring clarity and persuasion. 
 
Key Discussion Points: 
 
  • Establishing clear and realistic expectations. 
  • Quantifying AI benefits and costs. 
  • Identifying metrics and KPIs to assess the success of AI projects .
  • The importance of continuous improvement and optimization.
  • Best practices for articulating the value and RoI of AI initiatives to the board.

Kush Sharma, Director Municipal Modernization & Partnerships,

Municipal Information Systems Association, Ontario

 

Dr. Denise Turley, Vice President, Corporate Systems | Leading AI

Implementation, U.S. Chamber of Commerce

 

Sergio Trindade, CISO, Águas do Tejo Atlântico

Patrick Bangert

VP and Chief of AI, Oxy

Noah Ringler

Artificial Intelligence Policy Lead, U.S. Department of Homeland Security

Rick Doten

VP, CISO, Information Security, Centene Corporation, Carolina Complete Health

Mitigating AI Supply Chain Risks

These risks are particularly acute in industries where operational technology (OT) and informational technology (IT) converge, making the entire ecosystem vulnerable to attacks originating from third-party vendors.
This session will delve into the challenges of securing AI supply chains, focusing on assessing vendor security, understanding the implications of using commercial off-the-shelf AI solutions, and implementing strategies to mitigate risks. By the end of this session, you will be better equipped to protect your organization from supply chain attacks that exploit vulnerabilities in AI tools and services. 
 
Discussion Points: 
 
  • Understanding AI Supply Chain Risks: Explore the specific supply chain risks introduced by third-party AI tools, especially in environments where OT and IT intersect, and how these risks can lead to significant security breaches. 
  • Vendor Security Assessment: Learn how to rigorously assess and mitigate the security posture of AI vendors, ensuring they meet the necessary security standards and do not introduce vulnerabilities into your systems. 
  • Securing AI Tools: Discuss strategies for ensuring that AI tools are secure and trustworthy, including the importance of continuous monitoring, adherence to Zero Trust principles, and regularly updating security protocols in response to emerging threats. 

Patrick Bangert, VP and Chief of AI, Oxy

 

Noah Ringler, Artificial Intelligence Policy Lead, U.S. Department of

Homeland Security

 

Rick Doten, VP, CISO, Information Security, Centene Corporation, Carolina

Complete Health

Mike Manrod

CISO, Grand Canyon Education

Andres Andreu

Deputy CISO, Hearst

Phillip Davies

CISO, Equifax UK

Building Stronger Defenses with AI

 By automating threat detection, predicting potential security incidents, and enabling more effective threat hunting, AI helps organizations stay ahead of increasingly sophisticated cyber threats. However, effectively deploying AI in cybersecurity requires overcoming challenges such as ensuring model accuracy, managing data, and integrating AI seamlessly into existing security operations. This session will explore the strategic and practical considerations for leveraging AI to build stronger, more resilient defenses, specifically addressing the needs of CISOs. 
 
You Will Learn: 
 
  • Operationalizing AI for Security: Understand how to integrate AI into daily security functions, ensuring that analysis and outputs are usable by security teams and actionable within existing workflows. 
  • Data Management and Model Accuracy: Explore the importance of accessing the right data for AI models, including considerations for data indexing, handling sensitive information, and ensuring that AI outputs are explainable to non-technical stakeholders. 
  • Use Case Implementation: Learn how to assess whether AI or machine learning (ML) is necessary for a given security use case, or if simpler methods can achieve similar results. The session will cover how to conduct performance analysis comparing AI-based methods to traditional ones. 
  • Best Practices for AI Integration: Discover best practices for integrating AI with your current security architecture, including considerations for scalability, model retraining, and handling special AI processing needs. Additionally, understand how to maximize the potential of AI-driven security without adding unnecessary complexity to your operations. 

Mike Manrod, CISO, Grand Canyon Education

 

Andres Andreu, Deputy CISO, Hearst

 

Phillip Davies, CISO, Equifax UK

Jayant Narayan

Head of AI Partnerships, Engagement & Strategy, United Nations Development Program

Pedro Tavares

Lead Data Scientist, Glencore

Jean-Yves Mathieu

CISO, Banque Internationale à Luxembourg (BIL)

Ethical AI in Cybersecurity: Ensuring Fairness and Transparency

The potential for bias in AI algorithms, often stemming from training data, can lead to discriminatory or unfair outcomes, such as biased profiling or misclassification of threats. The opaque “black box” nature of many AI systems complicates these issues, making it difficult to understand how decisions are made, which can erode trust and hinder accountability. This session will explore the critical ethical considerations of deploying AI in cybersecurity and provide strategies to develop and implement AI systems that are fair, transparent, and trustworthy. 
 
You Will Learn: 
 
  • Identifying and Mitigating Bias: Recognize how bias can infiltrate AI systems, leading to unfair outcomes in cybersecurity, and learn practical methods to identify and mitigate these biases to ensure fairness. 
  • Enhancing Transparency: Understand the importance of transparency in AI models and how to implement practices that make AI decision-making processes more interpretable and accountable. 
  • Balancing Privacy and Security: Explore the ethical balance between robust cybersecurity measures and protecting individual privacy, ensuring that AI systems do not overstep boundaries and infringe on personal rights. 
  • Establishing Accountability Frameworks: Learn how to create and implement accountability frameworks that define responsibility for AI-driven decisions, ensuring ethical practices are maintained throughout your organization. 

Jayant Narayan, Head of AI Partnerships, Engagement & Strategy, United

Nations Development Program

 

Pedro Tavares, Lead Data Scientist, Glencore

 

Jean-Yves Mathieu, CISO, Banque Internationale à Luxembourg (BIL)

Jeremy Grant

Managing Director, Technology Business Strategy, Venable LLP

The Future of Digital Identity in an AI-Powered World

AI’s ability to mimic biometrics and exploit identity proofing tools is driving a rise in identity-related suspicious activity, accounting for nearly 75% of suspicious activity reports filed by banks. While AI presents new risks, it also offers promising defenses, such as AI-powered liveness detection for biometrics and risk analytics. Yet, these tools alone will not suffice in combating increasingly sophisticated AI-driven attacks.
 
This session will explore the urgent need for financial services firms to embrace public key cryptography and digitally signed credentials, such as mobile driver’s licenses (mDLs), to enhance identity verification and thwart AI-enabled adversaries. We’ll discuss the role of phishing-resistant authentication solutions rooted in public key cryptography, along with recent government initiatives to accelerate the adoption of secure, privacy-preserving digital identities. Attendees will gain actionable insights on how to pair cryptographic defenses with biometric authentication, ensuring robust protection even as AI threats evolve.
 
Key Takeaways:
 
  • Combating AI-Driven Fraud: Strengthen identity verification systems to defend against AI-powered fraud by incorporating advanced authentication methods.
  • Leveraging Public Key Cryptography: Implement digitally signed credentials, such as mobile driver’s licenses, to ensure secure, AI-resistant identity proofing.
  • Enhancing AI-Powered Defenses: Continuously update and refine liveness detection and risk analytics tools to stay ahead of increasingly sophisticated attacks.
  • Fostering Government-Industry Collaboration: Advocate for partnerships to modernize legacy identity infrastructure and accelerate the adoption of AI-resistant solutions.

Jeremy Grant, Managing Director, Technology Business Strategy, Venable

LLP

Sergio Gago

Managing Director AI and Quantum, Moody's Analytics

Eric Harris

CISO, Charlie Norwood VA Medical Center

AI and Supercomputing: The Power of Duo Driving the Future of Tech

Supercomputing, with its immense computational power, is crucial for training complex AI models and processing enormous amounts of data at unprecedented speeds. This partnership has far-reaching implications, from accelerating scientific research to improving real-time analytics across various sectors. This session will delve into the fusion of AI and supercomputing, offering insights into the latest advancements, strategic advantages, and how to harness this powerful combination for innovation.
 
Key takeaways:
 
  • Supercomputing is pivotal in pushing the boundaries of AI with its ability to facilitate the training of massive models, faster simulations, and sophisticated data analysis, leading to groundbreaking innovations in multiple industries.
  • Real-world use cases demonstrate the intersection of AI and supercomputing in areas such as drug discovery, climate modelling, financial forecasting, and autonomous systems, showcasing how this fusion is reshaping entire sectors.
  • We will address the technical and operational obstacles, including infrastructure costs, energy consumption, and the need for specialized expertise, and provide strategies to overcome these barriers.
  • Gain insights into the future of AI and supercomputing, including emerging technologies like quantum computing and edge AI

Sergio Gago, Managing Director AI and Quantum, Moody’s Analytics

 

Eric Harris, CISO, Charlie Norwood VA Medical Center

Todd Covert

CISO, National General, Allstate

Suha Can

CISO, Grammarly

AI-Powered Cyber Attacks: Facing the Future of Threats

These AI-enabled cyber threats are not just theoretical; they are already being deployed to automate tasks like vulnerability scanning, phishing, and even bypassing traditional security measures with unprecedented precision. This session will dive into how adversaries are using AI to craft more personalized, adaptive, and stealthy attacks that can outmaneuver conventional defenses. We’ll examine real-world examples of AI-powered attacks an discuss actionable strategies to anticipate and counter these evolving threats. 
 
Key Takeaways: 
 
  •  Identify the New AI Attack Vectors: Gain insight into the latest AI-powered attack vectors, including deepfakes, AI-generated phishing emails, and autonomous malware, and how they differ from traditional cyber threats. 
  • Automation in Cybercrime: Understand how AI is automating and accelerating cyber attacks, enabling adversaries to conduct operations at a scale and speed previously unimaginable. 
  • Adaptive Defenses: Explore proactive defense strategies, including the integration of AI in threat detection, response, and intelligence gathering, to stay ahead of increasingly sophisticated AI-driven threats. 
  • Future-Proofing Security: Learn how to future-proof your organization’s cybersecurity posture by anticipating the next wave of AI-enabled cyber threats and developing resilient, adaptive defenses. 

Todd Covert, CISO, National General, Allstate

 

Suha Can, CISO, Grammarly

Rick Doten

VP, CISO, Information Security, Centene Corporation, Carolina Complete Health

Mario Rivas

CISO, Seguros Monterrey New York Life

Collaborating with AI to Enhance Security

This session will explore how AI and human expertise can complement each other, creating a more resilient and adaptive security framework. By leveraging AI’s analytical strengths alongside human intuition and contextual understanding, organizations can enhance their threat detection, response, and mitigation strategies. We will dive into best practices for designing workflows that maximize the strengths of both AI and human analysts, ensuring that your security team remains agile and effective. 
 
You Will Learn: 
 
  • Combining AI and Human Expertise: Understand how to leverage AI’s analytical power and human intuition to enhance threat detection and response capabilities. 
  • Optimizing Workflows: Learn how to design workflows that seamlessly integrate AI tools with human expertise, maximizing the strengths of both. 
  • Training Your Team: Discover best practices for training and adapting your security team to work effectively alongside AI, fostering a culture of collaboration and continuous learning. 

Rick Doten, VP, CISO, Information Security, Centene Corporation, Carolina

Complete Health

 

Mario Rivas, CISO, Seguros Monterrey New York Life

Virtual AI Summit

Virtual AI Summit

IP and Privacy Law Issues in Generative AI for Cyber Leaders

This session, tailored for experienced cybersecurity practitioners, will delve into the critical legal issues surrounding gen AI. The session will provide an overview of the latest gen AI technologies and their implications. It will explore intellectual property law issues, including potential legal risks, IP litigation, indemnification, and practical legal recommendations. Additionally, it will address privacy and cybersecurity law, emphasizing the importance of these principles and the unique risks posed by gen AI. Attendees will gain insights into the U.S. regulatory landscape and the EU AI Act, essential legal considerations for maintaining privacy and cybersecurity, and best practices for AI governance. This comprehensive session aims to equip cybersecurity practitioners with the knowledge and strategies needed to navigate the evolving legal landscape of gen AI effectively.

Key takeaways: 

  • Understand the latest gen AI technologies and their impact on cybersecurity;
  • Identify and mitigate IP risks associated with AI;
  • Navigate the complex regulatory landscapes of privacy and cybersecurity law;
  • Implement AI governance practices to ensure ethical and compliant use of AI.

John Chan, Director of Technology – AI/ML, Raymond James

 

Aaron Hand, Chief AI Officer, Arcelor Mittal

John Chan

Director of Technology - AI/ML, Raymond James

Aaron Hand

Chief AI Officer, Arcelor Mittal

Readying the Underlying Technology Infrastructure for Gen AI Adoption

For the success of Gen AI adoption, organizations must ensure that their IT infrastructure can support AI initiatives, including data management systems, computing power, and integration capabilities. 
 
The session will delve into the foundational elements required to build and maintain an AI infrastructure that can scale effectively with increasing data volumes, computational demands, and evolving business needs. It will cover the best practices for integrating scalable computing resources, data management systems, and robust architecture frameworks to ensure long-term AI success. 
 
Key Discussion Points: 
 
  • Assessing the current AI infrastructure for implementing and scaling generative AI.
  • Building a robust data architecture, including data storage, processing, and real-time analytics.
  • Role of cloud to address the compute resources to support gen AI workloads. 
  • Advanced security and compliance measures to protect sensitive data and AI models. 
  • Addressing technology integration and change management issues. 

John Chan, Director of Technology – AI/ML, Raymond James

 

Aaron Hand, Chief AI Officer, Arcelor Mittal

Closing Comments

Editor's Panel

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Past Summit Sponsors

The Summit Experience

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

October 29-30, 2024

Virtual Government Cybersecurity Summit: Hosted by GovInfoSecurity

November 7, 2024

Cybersecurity Summit NY: Financial Services Hosted by BankInfoSecurity

November 14, 2024

Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google Cloud Paris

December 5, 2024

Virtual IoT/OT Summit

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Future Events

October 29-30, 2024

Virtual Government Cybersecurity Summit: Hosted by GovInfoSecurity

November 7, 2024

Cybersecurity Summit NY: Financial Services Hosted by BankInfoSecurity

November 14, 2024

Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google Cloud Paris

Katie Jenkins

EVP & CISO , Liberty Mutual Insurance

Threat Intelligence and the Dark Web

In this session, a banking security leader and an FBI agent detail:

  • What the dark web is – and is not;
  • How to gain useful and complete information and apply it;
  • The pros and cons of going solo vs. hiring a service.