Event Overview
Seattle’s 2025 Data Security Summit focuses on safeguarding sensitive data in an increasingly complex digital environment. With AI rapidly becoming an integral part of enterprise systems, this event will explore securing machine learning models, detecting AI-generated threats, and managing the risks of non-human identities in cloud infrastructures. In light of growing ransomware attacks on critical infrastructure, attendees will gain insights into how AI can be leveraged to strengthen data security and prepare for the next wave of sophisticated cyber threats.
View our ISMG Event Experience video to see what your peers are saying about their participation.
Venue
Meydenbauer Center
11100 NE 6th Street, Bellevue WA 98004
Highlight Topics
- Securing Machine Learning Models
- Detecting AI-Generated Threats
- Managing Non-Human Identities
- AI-Enhanced Data Security
Chuck Markarian
Eric Sanchez
Courtney Hans
Lana DeMaria
Ginger Armbruster
Brian Shea
Aravind Swaminathan
Enzhou Wang
Lana DeMaria
Billy Martin
Ralph Johnson
Ivan Avilla
Speakers
Thought Leaders on Stage Leading Deep-Dive Discussions
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.
Agenda
Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.
Ralph Johnson
The CISO's Critical Role in Nurturing Data Security
- Orchestrating Comprehensive Data Protection Measures: Implement robust approaches like end-to-end encryption and role-based access control to maintain the confidentiality and integrity of critical information assets.
- Crafting and Implementing Incident Response and Data Loss Prevention (DLP) Strategies: Utilize advanced threat intelligence and behavior analytics to proactively thwart data breaches and unauthorized disclosures.
- Evaluating and Integrating Emerging Technologies: Leverage innovations such as AI-powered security analytics and blockchain-based data protection to enhance defenses and stay at the forefront of data security advancements.
Ralph Johnson, CISO, CyberEdBoard Member, Washington Technology Solutions (WaTech)
Cybersecurity Summit Dallas: Data Security
Cybersecurity Summit Dallas: Data Security
Managing the Expanding Attack Surface in a Hyper-Connected World
- Comprehensive Asset Discovery: How ASM tools provide continuous mapping of external-facing assets, including cloud services and shadow IT, to prevent blind spots, as illustrated in the Sisense and SolarWinds breaches.
- Real-Time Vulnerability Detection: Learn from recent incidents how misconfigurations and unpatched vulnerabilities became entry points for attackers, and how ASM can detect these issues in real-time.
- Risk Prioritization and Response Automation: Using machine learning to identify the most critical vulnerabilities and reduce response times, based on insights from breaches where faster detection could have minimized damage.
- Integration with SIEM and SOAR: Explore how ASM tools can seamlessly integrate with broader security systems to enhance real-time threat detection, drawing on lessons learned from recent breaches.
Billy Martin, Chief Technology and Security Officer, Vigor LLC
Courtney Hans, VP, Cyber Services, AmTrust Financial Services Inc.
Chuck Markarian
Enzhou Wang
Building a Resilient Data Security Strategy
- Layered Defenses for Complex Systems: Designing multi-faceted protection strategies that secure the data lifecycle across distributed infrastructures.
- AI-Powered Anomaly Detection: Applying advanced algorithms to identify unusual activity, prevent breaches, and mitigate evolving threats.
- Next-Generation Access Controls: Enforcing least-privilege policies with dynamic authentication tailored to hybrid and cloud-native environments.
- Proactive Compliance Strategies: Meeting evolving mandates like GDPR and HIPAA while building trust with stakeholders and customers.
Chuck Markarian, CISO, CyberEdBoard Member, PACCAR
Enzhou Wang, Chief Data Officer, City of Tacoma
Lana DeMaria
Aravind Swaminathan
Data Privacy and Decoupling: Ensuring Compliance and Data Integrity
- Decoupling Data for Privacy: Strategies to separate sensitive data for improved security and regulatory compliance.
- Adapting to New Privacy Regulations: How businesses can adjust data architecture to stay compliant with global data privacy laws.
- Minimizing Data Breach Risks: Best practices for protecting sensitive information and reducing data breach impacts.
- Case Studies on Data Decoupling: Real-world examples of how companies have implemented data decoupling to protect data privacy.
Lana DeMaria, Head of Data Governance and Privacy, Alaska Airlines
Aravind Swaminathan, Partner, CyberEdBoard Member, Orrick, Herrington
& Sutcliffe LLP
Cybersecurity Summit Dallas: Data Security
Cybersecurity Summit Dallas: Data Security
Agentic AI and the Future of Autonomy in Security
- Understand how agentic AI differs from previous waves of AI and its implications for business operations and security.
- Explore strategies for securely integrating autonomous agents into critical workflows.
- Identify emerging vulnerabilities posed by agentic AI and how to mitigate them effectively.
- Discuss ethical and regulatory considerations essential for the responsible deployment of agentic AI.
Augie D’Agostino, CISO, UW Medicine
Cybersecurity Summit Dallas: Data Security
Inside the Ransomware Battlefield: Former CISO on Defending Critical Infrastructure and Leading Through Crisis
This session will:
- Explore the speaker’s firsthand experience in managing a significant ransomware attack compared to prior training.
- Highlight the importance of communication and showing empathy in incident response.
- Discuss the personal and financial implications of a cyber incident for CISOs, their organizations and customers.
- Emphasize the need for collaboration among legal, compliance and communication stakeholders.
Robert Costello, Chief Information Officer, CISA
Cybersecurity Summit Dallas: Data Security
Cybersecurity Summit Dallas: Data Security
Uncovering Insider Threats with Behavioral Analytics
- Machine Learning for Behavioral Insights: How to train models that pinpoint deviations in user activity across diverse systems.
- Real-Time Detection: Implementing anomaly detection techniques to identify irregularities as they occur.
- Integration with SIEM and SOAR: Using behavioral data to enhance automation and incident response workflows.
- Case Studies: Technical analysis of successful behavioral analytics implementations, emphasizing reduced false positives and operational gains.
Ivan Avilla, Director of Cyber Incident Response, GoDaddy
Varsha Agarwal, CyberEdBoard Member, Head of Information Security,
Prosper Marketplace
Cybersecurity Summit Dallas: Data Security
Trust Undermined: An Immersive Simulation of AI-Augmented Insider Threats
- Precision Threat Response: Master techniques for isolating compromised systems, analyzing hybrid network activity, and mitigating cascading disruptions caused by insider-enabled AI attacks.
- Real-World Scenario Insights: Understand how AI-driven insider threats exploit IT-OT vulnerabilities, with lessons applicable to sectors reliant on interconnected systems.
- Actionable Defense Playbook: Design advanced countermeasures, including micro-segmentation, AI-based anomaly detection, and evidence preservation for incident response and regulatory requirements.
Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik
Cybersecurity Summit Dallas: Data Security
Cybersecurity Summit Dallas: Data Security
Building Intelligent Data Infrastructure: Unlocking Cross-Industry Potential
- Leveraging AI for Efficiency: How intelligent systems can streamline operations and generate insights that lead to better business outcomes.
- Enhancing Security: Approaches for embedding strong security measures directly into your data infrastructure to protect against emerging threats.
- Scalability for the Future: Developing a flexible and adaptable infrastructure capable of evolving with your business needs and handling increasingly complex workloads.
Eric Sanchez, CyberEdBoard Member, CISO, Orrick, Herrington & Sutcliffe
LLP
George Williams, CIO, Washington Liquor and Cannabis Board
Don’t miss your chance to attend this dynamic impactful event
#ISMGSummit
@ISMG_News
Past Summit Sponsors








CPE Credits
ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
The Summit Experience
Future Events
February 12, 2025
February 20, 2025
Future Events
Katie Jenkins
Threat Intelligence and the Dark Web
In this session, a banking security leader and an FBI agent detail:
- What the dark web is – and is not;
- How to gain useful and complete information and apply it;
- The pros and cons of going solo vs. hiring a service.