Event Overview
The surge in sophisticated cyber threats requires security leaders to stay ahead with advanced defenses that protect critical data and systems.
The 2025 Seattle Data Security Summit brings together leading experts across information security, data engineering, privacy, and compliance to equip attendees with the strategies and tools needed to tackle today’s most pressing cybersecurity challenges. This year’s summit will focus on securing machine identities, mitigating risks in AI-generated code, and strengthening cloud security within resilient data architectures. Other discussions will cover managing expanding attack surfaces, leveraging behavioral analytics to reduce insider threats, and building proactive defenses against ransomware and AI-driven attacks.
Washington State’s comprehensive data privacy laws, including the My Health My Data Act and the Washington Privacy Act (WPA), are raising the bar for data protection and compliance. Organizations must navigate stricter regulations, enhanced consumer data rights, and serious penalties for non-compliance. A dedicated session will break down these laws, examine lessons from high-profile breaches, and offer strategies for aligning with frameworks like HIPAA and GDPR.
The summit will also highlight innovations in AI-powered security, data decoupling for privacy, and key takeaways from recent cyber incidents. Attendees will gain practical strategies for strengthening security postures, adapting to regulatory shifts, and securing sensitive data in an increasingly complex threat environment.
View our ISMG Event Experience video to see what your peers are saying about their participation.Â
Venue
Meydenbauer Center
11100 NE 6th Street, Bellevue WA 98004
Highlight Topics
- Securing Machine Learning Models
- Detecting AI-Generated Threats
- Managing Non-Human Identities
- Â AI-Enhanced Data SecurityÂ
Chuck Markarian
Eric Sanchez
Courtney Hans
Lana DeMaria
Ginger Armbruster
Brian Shea
Aravind Swaminathan
Enzhou Wang
Lana DeMaria
Billy Martin
Ralph Johnson
Ivan Avilla
Speakers
Thought Leaders on Stage Leading Deep-Dive Discussions
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.
Agenda
Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.
Ralph Johnson
The CISO's Critical Role in Nurturing Data Security
- Orchestrating Comprehensive Data Protection Measures: Implement robust approaches like end-to-end encryption and role-based access control to maintain the confidentiality and integrity of critical information assets.
- Crafting and Implementing Incident Response and Data Loss Prevention (DLP) Strategies: Utilize advanced threat intelligence and behavior analytics to proactively thwart data breaches and unauthorized disclosures.
- Evaluating and Integrating Emerging Technologies: Leverage innovations such as AI-powered security analytics and blockchain-based data protection to enhance defenses and stay at the forefront of data security advancements.
Ralph Johnson, CISO, CyberEdBoard Member, Washington Technology Solutions (WaTech)
Billy Martin
Courtney Hans
Managing the Expanding Attack Surface in a Hyper-Connected World
- Comprehensive Asset Discovery: How ASM tools provide continuous mapping of external-facing assets, including cloud services and shadow IT, to prevent blind spots, as illustrated in the Sisense and SolarWinds breaches.
- Real-Time Vulnerability Detection: Learn from recent incidents how misconfigurations and unpatched vulnerabilities became entry points for attackers, and how ASM can detect these issues in real-time.
- Risk Prioritization and Response Automation: Using machine learning to identify the most critical vulnerabilities and reduce response times, based on insights from breaches where faster detection could have minimized damage.
- Integration with SIEM and SOAR: Explore how ASM tools can seamlessly integrate with broader security systems to enhance real-time threat detection, drawing on lessons learned from recent breaches.
Billy Martin, Chief Technology and Security Officer, Vigor LLC
Courtney Hans, VP, Cyber Services, AmTrust Financial Services Inc.Â
Chuck Markarian
Enzhou Wang
Building a Resilient Data Security Strategy
- Layered Defenses for Complex Systems: Designing multi-faceted protection strategies that secure the data lifecycle across distributed infrastructures.
- AI-Powered Anomaly Detection: Applying advanced algorithms to identify unusual activity, prevent breaches, and mitigate evolving threats.
- Next-Generation Access Controls: Enforcing least-privilege policies with dynamic authentication tailored to hybrid and cloud-native environments.
- Proactive Compliance Strategies: Meeting evolving mandates like GDPR and HIPAA while building trust with stakeholders and customers.
Chuck Markarian, CISO, CyberEdBoard Member, PACCAR
Enzhou Wang, Chief Data Officer, City of Tacoma
Lana DeMaria
Aravind Swaminathan
Sarah Carrier
Data Privacy and Decoupling: Ensuring Compliance and Data Integrity
- Decoupling Data for Privacy: Strategies to separate sensitive data for improved security and regulatory compliance.
- Adapting to New Privacy Regulations: How businesses can adjust data architecture to stay compliant with global data privacy laws.
- Minimizing Data Breach Risks: Best practices for protecting sensitive information and reducing data breach impacts.
- Case Studies on Data Decoupling: Real-world examples of how companies have implemented data decoupling to protect data privacy.
Lana DeMaria, Head of Data Governance and Privacy, Alaska
Airlines
Aravind Swaminathan, Partner, CyberEdBoard Member, Orrick,
Herrington& Sutcliffe LLP
Sarah Carrier, Privacy Program Manager, Seattle Information
Technology Department
Augie D'Agostino
William Lidster
Sacha Faust
Agentic AI and the Future of Autonomy in Security
- Understand how agentic AI differs from previous waves of AI and its implications for business operations and security.
- Explore strategies for securely integrating autonomous agents into critical workflows.
- Identify emerging vulnerabilities posed by agentic AI and how to mitigate them effectively.
- Discuss ethical and regulatory considerations essential for the responsible deployment of agentic AI.
Augie D’Agostino, CISO, UW Medicine
William Lidster, CISO, AAA WashingtonÂ
Sacha Faust, CISO, Grammarly
Alexander Vitruk
Ginger Armbruster
Mastering Washington's Data Privacy Framework
- Gain a clear understanding of Washington’s privacy laws, including their operational impact and how they intersect with broader federal and international mandates.
- Learn how to prevent catastrophic breaches by studying the failures and vulnerabilities exposed in real-world cases, including T-Mobile’s high-profile incidents.
- Discover how to leverage AI tools for real-time threat detection and compliance automation while embedding Zero Trust architectures to enhance overall security resilience.
Alexander Vitruk, CyberEdBoard Member, Senior Associate
Attorney, BakerHostetler
Ginger Armbruster, Chief Privacy Officer and IT Division
Director, City of SeattleÂ
Varsha Agarwal
Cybersecurity Summit Dallas: Data Security
Uncovering Insider Threats with Behavioral Analytics
- Machine Learning for Behavioral Insights: How to train models that pinpoint deviations in user activity across diverse systems.
- Real-Time Detection: Implementing anomaly detection techniques to identify irregularities as they occur.
- Integration with SIEM and SOAR: Using behavioral data to enhance automation and incident response workflows.
- Case Studies: Technical analysis of successful behavioral analytics implementations, emphasizing reduced false positives and operational gains.
Â
Varsha Agarwal, CyberEdBoard Member, Head of Information
Security, Prosper Marketplace
CyberEdBoard
United States Secret Service
Trust Undermined: An Immersive Simulation of AI-Augmented Insider Threats
- Precision Threat Response: Master techniques for isolating compromised systems, analyzing hybrid network activity, and mitigating cascading disruptions caused by insider-enabled AI attacks.
- Real-World Scenario Insights: Understand how AI-driven insider threats exploit IT-OT vulnerabilities, with lessons applicable to sectors reliant on interconnected systems.
- Actionable Defense Playbook: Design advanced countermeasures, including micro-segmentation, AI-based anomaly detection, and evidence preservation for incident response and regulatory requirements.
CyberEdBoad & The U.S. Secret Service
Eric Sanchez
George Williams
Building Intelligent Data Infrastructure: Unlocking Cross-Industry Potential
- Leveraging AI for Efficiency: How intelligent systems can streamline operations and generate insights that lead to better business outcomes.
- Enhancing Security: Approaches for embedding strong security measures directly into your data infrastructure to protect against emerging threats.
- Scalability for the Future: Developing a flexible and adaptable infrastructure capable of evolving with your business needs and handling increasingly complex workloads.
Eric Sanchez, CISO, CyberEdBoard Member, Orrick, Herrington & Sutcliffe
LLP
George Williams, CIO, Washington Liquor and Cannabis BoardÂ
Don’t miss your chance to attend this dynamic impactful event
#ISMGSummit
@ISMG_News
Past Summit Sponsors








CPE Credits
ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
The Summit Experience
Future Events
March 12, 2025
April 10, 2025
Future Events
March 12, 2025
April 10, 2025
Katie Jenkins
Threat Intelligence and the Dark Web
In this session, a banking security leader and an FBI agent detail:
- What the dark web is – and is not;
- How to gain useful and complete information and apply it;
- The pros and cons of going solo vs. hiring a service.