Cybersecurity Summit: Implications of AI

February 24, 2026 | Virtual

Event Overview

ISMG Summits bring together global leaders in cybersecurity, risk management, information technology and digital trust for immersive, knowledge-sharing experiences. These events feature carefully curated agendas with thought-provoking keynotes, expert panel discussions and interactive workshops that address the most pressing challenges facing today’s security landscape – from threat intelligence and zero trust to AI governance, data protection and regulatory compliance.

Designed for senior executives and decision-makers across industries such as finance, healthcare, government and critical infrastructure, ISMG Summits provide valuable insights, practical strategies and opportunities for collaboration. Attendees gain actionable takeaways, forge meaningful connections and stay ahead in an ever-evolving digital threat environment.

Advisors

Guiding Our Summit With Industry Expertise

Our Summit Advisory Committee comprises industry visionaries whose guidance ensures the conference programs remain relevant, cutting-edge, and aligned with the most pressing cybersecurity challenges and opportunities – enabling attendees to apply the insights and learnings to their daily work.

Corradino Corradi

General Manager of Information Security Strategy, Architecture and Technical Excellence, MTN

Dr. Bharath Soni

CISO and DPO, GT Bank

Renaldo Jack

Group Head of Cybersecurity, Globeleq

Deidre Marais

CISO, Western Cape Government and ISC2 Cape Town Chapter Advisory Board Member

Dr. Bharath Soni

CISO and DPO, GT Bank

Anna Collard

Senior Vice President of Content Strategy and Evangelist, KnowB4 Africa

Tunde Dada

Group CIO/BCM, inq. digital Group

Renaldo Jack

Group Head of Security, Globeleq

Mojalefa Moffamere

Network,Security and Telephony Manager, Assupol

Grant Hughes

CISO, GWV Group

Hanniel Jafaru

Founder and Executive Director, HTC Academy

Femi Olofintila M

Cyber risk, compliance and data privacy SME, Reliance Home Comfort

2025 Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda Highlights

  • The Enemy Within- Tackling Insider Risks
  • AI vs AI: How AI Can be Used to Fight Against AI Attacks
  • Managing Vendor Risks Beyond the Contract
  • Cloud Security with Zero Trust
  • Smart Cloud Strategies: Balancing Cost Reduction with Peak Performance

2025 Agenda

Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.

7:30 AM - 8:30 AM ET

Registration & Breakfast

8:30 am - 8:35 am et

Opening Comments

9:00 AM - 9:30 AM ET

Keynote: AI, Automation and the Future of Cybersecurity Careers in Africa

From automating detection and response to generating sophisticated attacks, AI is both a powerful tool and a formidable disruptor. For African enterprises and governments, this transformation raises urgent questions: Will automation deepen the cybersecurity talent gap? Which roles are most at risk of being augmented or eliminated? How can regulation, policy and upskilling ensure that the workforce evolves alongside the technology? This keynote will address strategies to future-proof careers, build sustainable talent pipelines and balance innovation with responsible governance.

This session will cover:

  • How AI-driven tools are changing the skills mix and redefining cybersecurity roles across African industries;
  • Strategies for upskilling, re-skilling and developing talent to thrive in an AI-augmented security environment;
  • Why African regulators and industry leaders must collaborate to create frameworks that protect both security and livelihoods.

Sanjit Ganguli,

VP, CTO in Residence, Zscaler

9:30 AM - 10:00 AM ET

Fireside Chat: Fighting Fire with Fire: Defending Against AI With Advanced Intelligence​

But can defensive AI truly outsmart offensive AI, or are we entering an arms race with unpredictable consequences? This session will explore the evolving landscape of AI-powered cybersecurity, weighing the opportunities and risks of using machine intelligence to detect, defend and respond in real time.

This session will cover:

  • Examining how offensive AI is transforming the threat landscape through automation, obfuscation and scale;
  • Exploring how defensive AI can be deployed to accelerate detection, reduce response time and anticipate attack patterns;
  • The strategic, ethical and operational implications of an AI vs. AI security paradigm, and what it means for enterprise defense planning.

Vlad Brodsky,

Chief Information Officer & Chief Information Security Officer, OTC Markets Group Inc.

Steve Lenderman,

Head of Fraud Prevention, iSolved, CyberEdBoard Member

Josh Cigna,

Solutions Architect, Yubico

10:00 AM - 10:30 AM ET

Attention Is the New Perimeter: Strengthening Security Culture With Cognitive Resilience

As threat actors exploit our attention and emotions, it’s time we reframe our human defense strategies.

This session introduces a modern, science-based approach to security culture: one that moves beyond awareness into actionable resilience. Drawing from cyber psychology and behavioral science, we’ll explore how cultivating digital mindfulness can interrupt habitual mistakes, improve decision-making and foster a more vigilant workforce.

Rather than blaming users, the session introduces a constructive and empowering model to build cognitive resilience – treating attention as the new perimeter in your layered defense strategy.

This session will cover:

  • Embedding cognitive resilience into your security culture;
  • Applying security-in-depth thinking to the human layer;
  • Why attention hygiene is becoming as critical as password hygiene.

Chris Wysopal,

Chief Security Evangelist, Veracode

10:30 AM - 10:40 AM ET

The CISO's Boardroom Playbook: Communicating Cyber Risk to Executives

This session will explore how security leaders can effectively communicate cyber risk in business terms, align cybersecurity KPIs with enterprise goals and build boardroom confidence during periods of economic uncertainty. Attendees will learn how to shift conversations from vulnerabilities and tools to resilience, risk appetite and long-term value creation while securing critical investment in cybersecurity initiatives.

This session will cover:

  • Translating technical risk into business impact for African boards;
  • Aligning cybersecurity KPIs with business objectives;
  • Making the case for investment in cybersecurity during economic volatility.

Vincent Stoffer,

Field CTO, Corelight, Inc

10:40 AM - 11:05 AM ET

Networking Break

11:05 AM - 11:35 AM ET

Securing LLMs in the Enterprise: Managing Risk Without Slowing Innovation​

But with new opportunities come new risks: data leakage, prompt injection, unauthorized access and compliance gaps. This session will guide CISOs and IT leaders through the evolving threat landscape of enterprise LLMs, offering practical strategies for securing models, controlling access and aligning deployments with internal policies and regulatory requirements. Whether you’re piloting gen AI or scaling adoption, this session will help you build safely and responsibly.

This session will cover:

  • How prompt injection, model manipulation and data exposure can compromise enterprise LLM deployments;
  • Exploring frameworks for access controls, usage monitoring and internal policy enforcement around gen AI tools;
  • Securing LLM pipelines – from data inputs and APIs to model hosting environments and third-party integrations.

Chris Young,

Cybersecurity Enterprise Account Executive, OpenText

11:40 AM - 11:50 AM ET

Fireside chat: AI in Zero Trust: Hope, Hype and Hidden Gaps

CISOs see AI as a “basket of opportunities” with plenty of “vendor blind spots.”

This session will cover:

  • How CISOs can cut through the vendor hype around AI;
  • Why AI-driven zero trust fails without architecture alignment;
  • Where should CISOs draw the line between AI autonomy and oversight.

Kristopher Schroeder,

Founder & CEO, Replica Cyber

12:55 PM - 1:40 PM ET

Lunch

11:55 Am - 12:25 pm et

Managing Vendor Risks Beyond the Contract

As high-profile breaches involving vendors become more common, enterprises must develop a continuous, risk-based approach to vendor management — focusing on real-time monitoring, access governance, compliance auditing, and incident response readiness. This session will explore how organizations can move beyond checklist-based vendor onboarding to build dynamic, proactive vendor risk management programs that safeguard sensitive data, critical operations, and regulatory compliance across complex supply chains.

This session will cover:

  • What red flags can one look for during vendor onboarding to mitigate fraud risk
  • What tools or techniques must be used to detect fraudulent activity post-onboarding
  • How can organizations operationalize continuous vendor risk assessment without creating administrative burden

Tim Hill

VP, Software Engineering, Rocket Software

12:25 Pm - 12:55 Pm et

Panel: Future-Proof Cloud Security: Leadership Strategies for Emerging Threats

From supply chain compromises to AI-powered attacks, the cloud security landscape is evolving faster than traditional controls can keep up.

Attendees will explore actionable strategies to build resilient, future-ready cloud security programs, while gaining guidance on aligning security architecture with business priorities, managing risk across infrastructure and fostering a culture of continuous security innovation.

This session will cover:

  • Evolving tactics being used by adversaries to exploit cloud misconfigurations, supply chains and identity systems;
  • How AI-driven detection, automated response and continuous validation can help mitigate sophisticated attacks at scale
  • How to communicate cloud security risks and investments to boards and executives to drive alignment and accountability.

Sandeep Bhide

VP Product Management, ProcessUnity

5:05 PM ET

Closing Comments

Our Partner

Register

CPE Credits

ISMG Summits offer Continuing Professional Education Credits. Learn informative and engaging content created specifically for security professionals.

The Summit Experience

Upcoming ISMG Events

October 22, 2025

The Velocity Paradox: Accelerating Financial Services Growth While Securing Data

October 22, 2025

CISO Workshop: AI and Identity Management

October 23, 2025

Cybersecurity Financial Services Summit: Toronto

November 5, 2025

Fraud Prevention Security Summit: New York

November 6, 2025

Cybersecurity Summit: New York Financial Services

Upcoming ISMG Events

October 22, 2025

The Velocity Paradox: Accelerating Financial Services Growth While Securing Data

October 22, 2025

CISO Workshop: AI and Identity Management

October 23, 2025

Cybersecurity Financial Services Summit: Toronto