August 19-20, 2025

ISMG Virtual Summit: Cybersecurity Implications of AI

10:00 - 15:30 | Virtual Event

On Demand August 20, 2025

Event Overview

The Virtual AI Summit by ISMG delves into a dynamic exploration of the intersection between AI and cybersecurity. Take a deep dive into ethical considerations, LLM security, and the intricate impacts on privacy and intellectual property. Engage directly with industry leaders to uncover the synergy between human intelligence and AI in fortifying cybersecurity, with a special focus on AI-driven threat detection and risk management strategies. This summit equips security professionals with vital AI insights, promoting transparent governance and hands-on application through sessions dedicated to real-world cybersecurity challenges. Expect a day packed with strategic dialogues, invaluable insights, and collaborative exploration at the forefront of AI and cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

  • Leveraging AI for Defense
  • Balancing Privacy and Compliance
  • Secure AI Integration
  • Combating Threats With AI
  • Diverse Industry AI Applications

Robert Costello

Chief Information Officer, CISA

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Ginger Armbruster

Chief Privacy Officer and IT Division Director, City of Seattle, WA

Tyler Maddry

Partner, Hunton Andrews Kurth LLP

Lisa Sotto

Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP

Kenneth Townsend

CISO, Ingredion

E.P. Mathew

Deputy CIO, Defense Intelligence Agency

Imran Ahmad

Partner/Canadian Head of Technology, Norton Rose Fulbright

John Horn

Director, Cybersecurity Practice, Datos Insights

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

Anahi Santiago

CISO, ChristianaCare

Ray Griffin

CISO and Head of Information Security, Cox Media Group

Past Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda

Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.

Opening Remarks

Virtual AI Summit, 2025

AI Under Control: How CISOs Can Govern, Oversee, and Secure AI-Powered Cybersecurity

While AI-driven systems can significantly enhance threat detection, automate responses, and analyze vast amounts of data faster than ever before, they also present a host of new challenges for CISOs. As cybercriminals increasingly weaponize AI for sophisticated attacks—from automated phishing campaigns to deepfake fraud—the risk to organizations’ security is rising. Additionally, algorithmic bias and adversarial attacks targeting AI models can introduce significant vulnerabilities, undermining the fairness and effectiveness of automated decisions. This makes AI governance, transparency, and human oversight critical to maintaining security and trust in AI systems. In this keynote, we’ll discuss how CISOs can ensure AI systems are secure, ethical, and aligned with regulatory requirements. With AI now central to business and security operations, this session will explore strategies to navigate the challenges of 2025 and beyond while ensuring AI is deployed safely and responsibly.
 
As AI becomes increasingly central to cybersecurity, the ability to govern, oversee, and secure AI systems will be crucial for CISOs to ensure their organizations stay ahead of potential risks. This session will provide the insights and tools needed to navigate the complex challenges of managing AI in cybersecurity in 2025 and beyond.
 
Key Takeaways:
 
  • CISOs must manage bias, preserve auditability, and react to changing regulations—especially in sensitive industries—to limit risks and safeguard reputation as AI transforms cybersecurity.
 
  • From adversarial attacks to the potential for bias in AI systems, CISOs need to adopt strategies to handle the unique risks posed by AI. A balance of AI’s capabilities and human oversight is key to ensuring secure, fair, and reliable decision-making.
 
  • Given AI’s impact on sectors like healthcare, finance, and public safety, CISOs must ensure these systems are explainable and auditable. Prioritizing transparency helps build trust with regulators, customers, and internal teams.

Robert Costello, Chief Information Officer, CISA

Virtual AI Summit, 2025

Convergence of AI and Cybersecurity: The Way Forward for Enterprise Security From a Policy Perspective

But the convergence of these technologies raises critical policy questions around governance, accountability and cross-border risks. This session will explore how APAC governments and regulators can design forward-looking frameworks that support AI innovation in security while ensuring responsible use, data protection and regional interoperability.

The session will cover:

  • Understanding the unique challenges and opportunities of AI-driven cybersecurity in APAC’s diverse regulatory landscape.
  • Exploring policy approaches that promote secure AI adoption while addressing risks such as model exploitation, data misuse and algorithmic opacity.
  • How public-private collaboration can shape resilient, future-ready enterprise security frameworks across the region.

Shaked Rotlevi, Technical Product Marketing Manager, Wiz

Virtual AI Summit, 2025

How Agentic AI is Reshaping Cybersecurity and Incident Response

Enterprises are leveraging agentic AI for automated threat hunting, behavioral anomaly detection and incident containment, significantly reducing response time and minimizing damage from cyberattacks. But the rise of agentic AI also introduces challenges, such as ensuring ethical decision-making, preventing adversarial exploitation and maintaining human oversight in critical security operations.

The session will cover:

  • Leveraging agentic AI for deception technology and threat simulation;
  • Understanding the risks of AI bias and the adversarial manipulation of AI-driven security models;
  • Balancing human intuition with AI-driven automation for better decision-making.

Tim Gallo, Head of Global Solutions Architects, Google

 

Virtual AI Summit, 2025

Virtual AI Summit, 2025

How Does AI Continue to Change Cybersecurity: Insights From CISOs

It is critical to understand how AI-driven security measures – build with algorithmic precision and human oversight – are evolving to assess and mitigate risks.

CISOs must develop effective processes to integrate AI into cybersecurity operations and manage AI sprawl to ensure governance frameworks meet stringent AI security and privacy regulations.

The session will cover:

  • Unique security risks introduced by AI-powered applications.
  • Making AI ubiquitous for cyber resiliency.
  • Redefining cybersecurity with the use of AI.

 

Jaimen Hoopes, Vice President of Product Management, Data Security

Solutions

 

Ronan Murphy, Member of the AI Advisory Council, Government of Ireland

Virtual AI Summit, 2025

Use of AI in Digital Banking: what's at Stake for CISOs?

But for CISOs, it also introduces new cybersecurity and compliance challenges. AI-driven solutions – from predictive fraud analytics to biometric authentication – require robust security frameworks to prevent data breaches, model manipulation and adversarial attacks.

The rise of deepfakes and synthetic identity attacks also demand continuous monitoring and advanced threat intelligence. CISOs must establish robust AI governance, adversarial AI defenses and zero trust frameworks to ensure secure AI adoption in banking.

The session will cover:

  • Regulatory trends shaping AI adoption in financial services.
  • Best practices for securing AI-driven banking.
  • Ensuring accuracy and fairness in AI-based financial decision-making.

Liquian Lim, Senior Product Marketing Manager, Snyk

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Defensive AI vs. Offensive AI: Fighting with Fire

But can defensive AI truly outsmart offensive AI, or are we entering an arms race with unpredictable consequences? This session explores the evolving landscape of AI-powered cybersecurity, weighing the opportunities and risks of using machine intelligence to detect, defend and respond in real time.

The session will cover:

  • Examining how offensive AI is transforming the threat landscape through automation, obfuscation and scale.
  • Exploring how defensive AI can be deployed to accelerate detection, reduce response time and anticipate attack patterns.
  • Discussing the strategic, ethical and operational implications of an AI vs. AI security paradigm – and its impact on enterprise defense planning.

Imran Ahmad, Partner/Canadian Head of Technology, Norton Rose

Fulbright

 

Ray Griffin, CISO and Head of Information Security, Cox Media Group

 

John Horn, Director, Cybersecurity Practice, Datos Insights

 

Shervin Evans, Information Security Officer, Deltec Bank & Trust Limited

Virtual AI Summit, 2025

The Rise of Adversarial AI as a Service: A CXO Debate

A new threat is emerging: adversarial AI as a service, allowing cybercriminals to rent or buy AI-powered attack tools with minimal technical expertise. This session will feature a live debate on the risks, implications and ethical questions posed by the rise of commoditized offensive AI. How should enterprises, regulators and security leaders respond? Should AI tools be restricted at the source – or will open innovation always outpace regulation?

The session will cover:

  • Understanding how AI as a service is lowering the barrier for sophisticated attacks such as deepfake phishing, automated recon and evasion.
  • Evaluating the ethical and regulatory challenges of limiting offensive AI capabilities while supporting open innovation.
  • Exploring proactive defense strategies to detect, disrupt, and deter AI-enabled threats. 

Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Should APAC Governments Lead Their Own AI Regulations or Follow Global Frameworks for AI Regulation?

India’s DPDP Act, Singapore’s AI Verify and Japan’s softer self-regulation present different regulatory philosophies. Opponents argue that aligning with standards such as NIST, ISO or EU AI Act ensures global interoperability and trust. Striking the right balance is critical – not only for innovation and economic competitiveness but also for ensuring trust, interoperability and ethical deployment.

The session will cover:

  • Understanding the risks and benefits of leading versus aligning with global AI regulations from a business and policy perspective.
  • Exploring how regulatory fragmentation or harmonization may affect enterprise AI strategy, data governance and compliance planning.
  • Gaining insights into how regional regulatory decisions may shape APAC’s global position in AI innovation and adoption.

Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity

Practice, Hunton Andrews Kurth LLP

 

Tyler Maddry, Partner, Hunton Andrews Kurth LLP

Track A

Securing the Road: Why Vulnerabilities in Electric Logging Devices are Everyone's Problem

Peeyush Patel

CISO, XPO

Jeremy Daily

Associate Professor, Colorado State University
This session, tailored for CISOs and cybersecurity leaders across various industries, will provide crucial insights into these vulnerabilities. While the primary focus is on transportation, the speakers’ insights into IoT vulnerabilities, wireless network security, and firmware integrity will be applicable to many sectors, including manufacturing, healthcare, finance, and critical infrastructure. Learn how ELDs, mandated to track driving hours and log critical vehicle data, can be exploited via Bluetooth or Wi-Fi connections, leading to unauthorized control, data manipulation, and malware propagation. These insights are not just crucial for the transportation sector but resonate across all industries reliant on interconnected and IoT systems.
 
The final vulnerability, and perhaps the most concerning, is the potential for a self-propagating truck-to-truck worm, which takes advantage of the inherent networked nature of these devices. Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications.
 
Key takeaways:
 
  • Understanding the parallels between ELD vulnerabilities and broader IoT security challenges affecting various industries;
  • Practical measures to safeguard interconnected systems and prevent widespread operational disruptions;
  • The importance of cross-industry collaboration in tackling emerging cybersecurity threats.
 

Peeyush Patel, CISO, XPO

 

Jeremy Daily, Associate Professor, Colorado State University

Track B

AI in Healthcare: Addressing Bias and Security Risks

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

David Anderson

Vice President, Cyber, Woodruff Sawyer

Anahi Santiago

CISO, ChristianaCare

Alex Vitruk

Senior Associate Attorney, BakerHostetler
However, as AI algorithms increasingly influence medical decision-making, concerns about bias and discrimination have become more apparent. These biases can arise from inherent issues in AI datasets, algorithmic design, and implementation, potentially perpetuating disparities in healthcare delivery and outcomes. This session will delve into the ethical, legal, and security implications of healthcare discrimination facilitated by AI, including the erosion of trust, patient harm, and legal challenges. We will explore how AI’s blind spots can inadvertently reinforce existing biases and how representative datasets can help mitigate these challenges.
 
Join us to examine the following key areas:
 
  • Biases in AI datasets: Understand how biases in training data can lead to unequal healthcare outcomes and discuss the importance of using diverse and representative datasets.
  • Algorithmic design, implementation and security: Analyze how design choices and system vulnerabilities can influence the fairness and safety of AI applications.
  • Mitigation and protection strategies: Discuss effective strategies to mitigate bias in AI healthcare applications, emphasizing the need for ongoing oversight, ethical standards, and robust security measures to ensure equitable and ethical use of AI in healthcare.
 

Heather West, Senior Director, Cybersecurity and Privacy Services, Venable

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

Alex Vitruk, Senior Associate Attorney, BakerHostetler

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Optimizing IT With AI: Preparing for the Post-Quantum World

The convergence of AI-driven optimization and post-quantum readiness presents both opportunities and challenges. Forward-thinking CIOs and CISOs must create IT environments that are not only agile and efficient today but also resilient against future quantum threats.

This session will explore how AI can streamline infrastructure management, enhance threat detection and improve decision-making, while laying the foundation for cryptographic agility and quantum-safe architectures.

The session will cover:

  • Using AI to modernize IT operations, automate decision-making and improve agility across complex environments.
  • Building quantum resilience now by identifying vulnerable cryptographic assets and evaluating post-quantum algorithms.
  • Aligning IT, security and compliance strategies to ensure long-term readiness for a quantum-powered threat landscape.

John Banghart, Senior Director for Cybersecurity Services, Venable LLP

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

 

Virtual AI Summit, 2025

Virtual AI Summit, 2025

New Roles, New Rules: How Generative AI is Shaping the IT Workforce of Tomorrow

Businesses are witnessing a fundamental shift in how work is done and what skills are essential. CIOs and business leaders are now tasked with steering this transformation, ensuring that AI-driven productivity aligns with long-term workforce strategy, compliance and ethical governance.

The session will cover:

  • New roles and responsibilities for CIOs and business leaders.
  • Reskilling and training for gen AI transformation.
  • Ethics and governance frameworks for gen AI integration.

Ginger Armbruster, Chief Privacy Officer and IT Division Director

 

Karen Habercoss, Chief Privacy Officer, UChicago Medicine

Virtual AI Summit, 2025

AI ROI Debate: Are Enterprises Overinvesting in AI Without Clear Returns?

Enterprises must identify common AI adoption pitfalls, define success metrics and strike a balance between innovation and real-world outcomes. Over-scaling AI initiatives across critical functionalities without a clear business case may lead to increased costs.

The session will cover:

  • The impact of scaling AI too fast without a clear business case.
  • How vendors can help businesses shift from experimentation to measurable outcomes.
  • Defining meaningful AI success metrics beyond cost savings and automation.

Bill Foster, U.S. Representative, Illinois 11th Congressional District

Virtual AI Summit, 2025

Scaling AI With Confidence: Overcoming Technical and Cultural Barriers to Enterprise Adoption

To realize the full value of AI, enterprises must embed it into their architecture, align it with strategic goals and establish strong governance. CIOs and CISOs play a critical role in driving cross-functional collaboration, ensuring data quality and building trust through transparency and regulatory compliance.

This session will explore how to shift from experimentation to enterprise-scale AI that is secure, ethical and built for long-term impact.

The session will cover:

  • Breaking down silos and modernizing infrastructure to align AI initiatives with business priorities and outcomes.
  • Implementing strong governance, bias mitigation and data transparency to meet evolving trust and compliance requirements.
  • Integrating AI into enterprise strategy to drive efficiency, innovation and sustainable growth.

Bill Foster, U.S. Representative, Illinois 11th Congressional District

Closing Comments

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Editor's Panel

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Past Sponsors

forcepoint

The Summit Experience

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

May 13, 2025

Leveraging Zero Trust and Continuous Threat Exposure Management

May 15, 2025

Data Security Summit: Dallas

May 15, 2025

Gen AI in Financial Services: Protecting Users and Data in the Age of Shadow AI

May 20, 2025

IdentityTV

May 22, 2025

Spark USA: The Future of AI-Reinforced Threat Detection

Future Events

May 13, 2025

Leveraging Zero Trust and Continuous Threat Exposure Management

May 15, 2025

Data Security Summit: Dallas

May 15, 2025

Gen AI in Financial Services: Protecting Users and Data in the Age of Shadow AI

Katie Jenkins

EVP & CISO , Liberty Mutual Insurance

Threat Intelligence and the Dark Web

In this session, a banking security leader and an FBI agent detail:

  • What the dark web is – and is not;
  • How to gain useful and complete information and apply it;
  • The pros and cons of going solo vs. hiring a service.