february 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

9:55 - 15:30 SGT | Virtual Event

On Demand February 12, 2025

Event Overview

The 2025 ISMG Virtual AI Security Summit is the ultimate digital gathering for cybersecurity leaders and AI innovators, offering unique case studies into how artificial intelligence is transforming security strategies across diverse sectors. This global summit will feature actionable perspectives from top industry experts, exploring AI’s role in shaping the future of threat defense and identity protection.

Attendees will gain insights into how AI is not only being weaponized by cybercriminals but also driving innovations in identity verification, supply chain security, and the integration of advanced computing technologies to counter increasingly sophisticated threats. Sessions will explore real-world applications, tackle pressing ethical challenges, and offer a roadmap for navigating the complexities of AI-driven cybersecurity.

Gain the strategies and knowledge necessary to fortify your defenses and stay ahead of AI’s transformative impact on information security. Join us for unparalleled access to a global brain trust of thought leadership at the cutting edge of cybersecurity and machine learning.

 

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

  • Exploring AI-Driven Malware Threats and Defense Strategies
  • Mitigating Risks from Large Language Models (LLMs)
  • Ethical and Regulatory Challenges of AI in Cybersecurity
  • AI-Powered Threat Detection and Automated Incident Response

Kush Sharma

Director, Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario

Dr. Denise Turley

Executive Leader in AI

Sergio Trindade

CISO, Águas do Tejo Atlântico

Patrick Bangert

VP and Chief of AI, Oxy

Noah Ringler

Artificial Intelligence Policy Lead, U.S. Department of Homeland Security

Rick Doten

VP, CISO, Information Security, Centene Corporation, Carolina Complete Health

Mike Manrod

CISO, Grand Canyon Education

Andres Andreu

Deputy CISO, Hearst

Sergio Gago

Managing Director, AI and Quantum, Moody's Analytics

Phillip Davies

CISO, Equifax UK

Pedro Tavares

Lead Data Scientist, Glencore

Jeremy Grant

Managing Director, Technology Business Strategy, Venable LLP

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda

Opening Comments

Mary Purk

Co-Founder and Former Director, AI at Wharton, The Wharton School of Business

Hemant Baidwan

CISO, U.S. Department of Homeland Security

Resilience and Trust at AI & Cybersecurity's Crossroads

This session will explore how AI can be utilized to enhance organizational resilience, while addressing the associated challenges in threat detection, response, and human involvement.

Panelists will discuss the evolution of AI-driven security measures to counter emerging cyber threats and consider the interplay between human factors and algorithmic precision. The discussion will offer practical insights into responsibly leveraging AI for sustainable digital security, addressing risks of automation and maintaining human trust.

Key Takeaways: 

  • AI’s Role in Strengthening Cyber Defenses: How AI can provide scalable, proactive threat detection while maintaining the agility to adapt to new attack methods. 
  • Human Impact and AI in Security: The role of human oversight in managing AI-driven security and how organizations can mitigate human-centric vulnerabilities. 
  • Navigating Ethical and Operational Challenges: Balancing AI’s potential with the ethical and security implications of automated decisions within critical infrastructure. 
  • Foundations for an AI-Resilient Security Strategy: Key strategies for developing a security framework that integrates AI responsibly, upholds trust, and builds adaptability. 

Mary Purk, Co-Founder and Former Director, AI at Wharton,

The Wharton School of Business

 

Hemant Baidwan, CISO, U.S. Department of Homeland Security

Tim Gallo

Head of Global Solutions Architects, Google

An In Depth Look at AI & the Evolving Cyber Threat Landscape

Key discussion points:
  •  Current Threat Landscape: Identifying the most significant attacks and attackers impacting organizations today. Understand the prevalent and dangerous cyber threats that enterprises face.
  • Evolving Attack Surface: Assessing how the attack surface has changed over the past year and the implications for security strategies. Explore how digital transformation and remote work have expanded vulnerabilities.
  • AI in Cybersecurity: Exploring the dual role of AI in both facilitating cyber attacks and bolstering cybersecurity defenses. Discuss how AI is used by adversaries and defenders alike.
  • Defensive Adaptations: Reviewing the advancements and shortcomings in security defenses over the past year. Highlight effective measures, existing gaps, and innovative solutions.

Tim Gallo, Head of Global Solutions Architects, Google 

Track A

Kush Sharma

Director Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario

Dr. Denise Turley

Executive Leader in AI

Sergio Trindade

CISO, Águas do Tejo Atlântico

AI Value Simplified: Communicating Impact and ROI to the Board​

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Kush Sharma, Director Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario
Dr. Denise Turley, Executive Leader in AI
Sergio Trindade, CISO, Águas do Tejo Atlântico

Track B

Wan Roshaimi Bin Wan Abdullah

Chief Technology Officer, CyberSecurity Malaysia

Integrating AI Into Cybersecurity Operations: The Way Forward

For cybersecurity practitioners, the key challenge has been building effective processes to integrate AI into their cybersecurity operations and managing AI sprawl to ensure governance structures meet stringent AI security and privacy regulations. 

The session will cover: 

  • Key components of an AI governance structure and its impact on cybersecurity;
  • Understanding unique security risks that AI-powered applications introduce;
  • Methods to make AI ubiquitous across the organization to build cyber resiliency.

For cybersecurity practitioners, the key challenge has been building effective processes to integrate AI into their cybersecurity operations and managing AI sprawl to ensure governance structures meet stringent AI security and privacy regulations. 

The session will cover: 

  • Key components of an AI governance structure and its impact on cybersecurity;
  • Understanding unique security risks that AI-powered applications introduce;
  • Methods to make AI ubiquitous across the organization to build cyber resiliency.

Wan Roshaimi Bin Wan Abdullahush Sharma, Chief Technology Officer, CyberSecurity Malaysia

Track A

Patrick Bangert

VP and Chief of AI, Oxy

Noah Ringler

Artificial Intelligence Policy Lead, U.S. Department of Homeland Security

Rick Doten

VP, CISO, Information Security, Centene Corporation, Carolina Complete Health

Mitigating AI Supply Chain Risks

These risks are particularly acute in industries where operational technology (OT) and informational technology (IT) converge, making the entire ecosystem vulnerable to attacks originating from third-party vendors.
This session will delve into the challenges of securing AI supply chains, focusing on assessing vendor security, understanding the implications of using commercial off-the-shelf AI solutions, and implementing strategies to mitigate risks. By the end of this session, you will be better equipped to protect your organization from supply chain attacks that exploit vulnerabilities in AI tools and services. 
 
Discussion Points: 
 
  • Understanding AI Supply Chain Risks: Explore the specific supply chain risks introduced by third-party AI tools, especially in environments where OT and IT intersect, and how these risks can lead to significant security breaches. 
  • Vendor Security Assessment: Learn how to rigorously assess and mitigate the security posture of AI vendors, ensuring they meet the necessary security standards and do not introduce vulnerabilities into your systems. 
  • Securing AI Tools: Discuss strategies for ensuring that AI tools are secure and trustworthy, including the importance of continuous monitoring, adherence to Zero Trust principles, and regularly updating security protocols in response to emerging threats. 

Patrick Bangert, VP and Chief of AI, Oxy
Noah Ringler, Artificial Intelligence Policy Lead, U.S. Department of Homeland Security
Rick Doten, VP, CISO, Information Security, Centene Corporation, Carolina Complete Health

Track B

Charmaine R.A. Valmonte

CISO, Aboitiz Equity Ventures Inc

Mario Demarillas

Board of Director, CISO and Head of IT Consulting & Software Engineering, Exceture Inc

David Siah

Vice President, South East Asia-Australia, Centre for Strategic Cyberspace & International Studies

Building an AI Governance Framework: Essential Steps

While AI’s automation capabilities enhance efficiency and innovation, they also introduce significant challenges related to accountability, transparency and ethical considerations. In absence of proper AI governance, there is a heightened risk of privacy breaches, biased algorithms and the malicious exploitation of AI technologies.  

The session will cover: 

  • Developing standards and guidelines for responsible AI design, development and deployment;
  • Determining appropriate human involvement in AI-augmented decision-making;
  • Building effective governance structures to enable security professionals to leverage AI confidently in risk assessment and threat response.

Charmaine R.A. Valmonte, CISO Aboitiz Equity Ventures Inc
Mario Demarillas, Board of Director, CISO and Head of IT Consulting & Software Engineering, Exceture Inc
David Siah, Vice President, South East Asia-Australia, Centre for Strategic Cyberspace & International Studies

Track A

Mike Manrod

CISO, Grand Canyon Education

Andres Andreu

Deputy CISO, Hearst

Phillip Davies

CISO, Equifax UK

Building Stronger Defenses with AI

 By automating threat detection, predicting potential security incidents, and enabling more effective threat hunting, AI helps organizations stay ahead of increasingly sophisticated cyber threats. However, effectively deploying AI in cybersecurity requires overcoming challenges such as ensuring model accuracy, managing data, and integrating AI seamlessly into existing security operations. This session will explore the strategic and practical considerations for leveraging AI to build stronger, more resilient defenses, specifically addressing the needs of CISOs. 
 
You Will Learn: 
 
  • Operationalizing AI for Security: Understand how to integrate AI into daily security functions, ensuring that analysis and outputs are usable by security teams and actionable within existing workflows. 
  • Data Management and Model Accuracy: Explore the importance of accessing the right data for AI models, including considerations for data indexing, handling sensitive information, and ensuring that AI outputs are explainable to non-technical stakeholders. 
  • Use Case Implementation: Learn how to assess whether AI or machine learning (ML) is necessary for a given security use case, or if simpler methods can achieve similar results. The session will cover how to conduct performance analysis comparing AI-based methods to traditional ones. 
  • Best Practices for AI Integration: Discover best practices for integrating AI with your current security architecture, including considerations for scalability, model retraining, and handling special AI processing needs. Additionally, understand how to maximize the potential of AI-driven security without adding unnecessary complexity to your operations. 

Mike Manrod, CISO, Grand Canyon Education
Andres Andreu, Deputy CISO, Hearst
Phillip Davies, CISO, Equifax UK

Track B

Shishir Kumar Singh

Group Head of Information Security Advance Intelligence Group

Matthias Yeo

Chief Executive Officer, CyberXCenter

Vinay Simha

Principal Enterprise Architect  - Enterprise and Data Architecture, Royal Philips

Building an AI-First Organization: Realistic or Hype?

Yet, despite widespread recognition of AI’s potential, many leaders struggle with implementation complexities. The feasibility of an AI-first approach depends on strategically integrating AI into core operations while addressing practical challenges – from driving measurable value and innovation to navigating organizational complexities. Leaders aiming to embrace AI at scale need actionable strategies for successful implementation. 

The session will cover: 

  • Strategies for moving beyond pilot projects to fully integrate AI into core operations;
  • Methods to align AI initiatives with strategic objectives for measurable value generation;
  • Approaches to leverage AI for driving sustainable innovation.

Shishir Kumar Singh, Group Head of Information Security Advance Intelligence Group
Vinay Simha, Principal Enterprise Architect  – Enterprise and Data Architecture, Royal Philips
Matthias Yeo, Chief Executive Officer, CyberXCenter

Track A

Jayant Narayan

Head of AI Partnerships, Engagement & Strategy, United Nations Development Program

Pedro Tavares

Lead Data Scientist, Glencore

Jean-Yves Mathieu

CISO, Banque Internationale à Luxembourg (BIL)

Ethical AI in Cybersecurity: Ensuring Fairness and Transparency

The potential for bias in AI algorithms, often stemming from training data, can lead to discriminatory or unfair outcomes, such as biased profiling or misclassification of threats. The opaque “black box” nature of many AI systems complicates these issues, making it difficult to understand how decisions are made, which can erode trust and hinder accountability. This session will explore the critical ethical considerations of deploying AI in cybersecurity and provide strategies to develop and implement AI systems that are fair, transparent, and trustworthy. 
 
You Will Learn: 
 
  • Identifying and Mitigating Bias: Recognize how bias can infiltrate AI systems, leading to unfair outcomes in cybersecurity, and learn practical methods to identify and mitigate these biases to ensure fairness. 
  • Enhancing Transparency: Understand the importance of transparency in AI models and how to implement practices that make AI decision-making processes more interpretable and accountable. 
  • Balancing Privacy and Security: Explore the ethical balance between robust cybersecurity measures and protecting individual privacy, ensuring that AI systems do not overstep boundaries and infringe on personal rights. 
  • Establishing Accountability Frameworks: Learn how to create and implement accountability frameworks that define responsibility for AI-driven decisions, ensuring ethical practices are maintained throughout your organization. 

Jayant Narayan, Head of AI Partnerships, Engagement & Strategy, United Nations Development Program
Pedro Tavares, Lead Data Scientist, Glencore
Jean-Yves Mathieu, CISO, Banque Internationale à Luxembourg (BIL)

Track B

Mel Migriño

Southeast Asia Regional Director and Philippines Country Head, Gogolook

Yew Kuann Cheng

Regional VP, Asia Pacific, PCI Security Standards Council

Accelerating Scams and Deepfakes in the AI Era: Stakes for enterprise security?

It is a sophisticated weapon that is difficult to detect because proliferation of AI tools that are weaponized to create fake voice, content and profiles. 

This fireside chat will delve on the use of AI tools used to developed deepfakes, how we can detect and control and the role of both private and public sector to combat these ever evolving issue. 

The session will discuss: 

  • How to build your defense strategy against AI’s weaponization; 
  • Developing a proactive crisis response to manage deepfake incidents; 
  • Using AI to assess deepfakes risks; 
  • Assessing the compatibility of the business privacy calculus framework with evolving technological landscapes and anticipate future privacy risks and opportunities

Mel Migriño, Southeast Asia Regional Director and Philippines Country Head, Gogolook
Yew Kuann Cheng, Regional VP, Asia Pacific, PCI Security Standards Council

Track A

Jeremy Grant

Managing Director, Technology Business Strategy, Venable LLP

Dennis Gamiello

Executive Vice President, Global Head of Identity, Mastercard

The Future of Digital Identity in an AI-Powered World

AI’s ability to mimic biometrics and exploit identity proofing tools is driving a rise in identity-related suspicious activity, accounting for nearly 75% of suspicious activity reports filed by banks. While AI presents new risks, it also offers promising defenses, such as AI-powered liveness detection for biometrics and risk analytics. Yet, these tools alone will not suffice in combating increasingly sophisticated AI-driven attacks.
 
This session will explore the urgent need for financial services firms to embrace public key cryptography and digitally signed credentials, such as mobile driver’s licenses (mDLs), to enhance identity verification and thwart AI-enabled adversaries. We’ll discuss the role of phishing-resistant authentication solutions rooted in public key cryptography, along with recent government initiatives to accelerate the adoption of secure, privacy-preserving digital identities. Attendees will gain actionable insights on how to pair cryptographic defenses with biometric authentication, ensuring robust protection even as AI threats evolve.
 
Key Takeaways:
 
  • Combating AI-Driven Fraud: Strengthen identity verification systems to defend against AI-powered fraud by incorporating advanced authentication methods.
  • Leveraging Public Key Cryptography: Implement digitally signed credentials, such as mobile driver’s licenses, to ensure secure, AI-resistant identity proofing.
  • Enhancing AI-Powered Defenses: Continuously update and refine liveness detection and risk analytics tools to stay ahead of increasingly sophisticated attacks.
  • Fostering Government-Industry Collaboration: Advocate for partnerships to modernize legacy identity infrastructure and accelerate the adoption of AI-resistant solutions.

Jeremy Grant, Managing Director, Technology Business Strategy, Venable LLP
Dennis Gamiello, Executive Vice President, Global Head of Identity, Mastercard

Track B

Sudhir Tiku

Vice President and Head - Asia Pacific and China, Bosch

Solving the Supply Chain Security Puzzle Through AI

Supply chains are growing longer, involving numerous partners, multiple regions and a wide array of products. While these networks offer benefits like cost reduction and global reach, they also introduce significant cybersecurity risks. 

Any disruption in the supply chain can have cascading effects, resulting in financial losses, reputational damage, and, in extreme cases, threats to national security. As traditional security measures prove inadequate, organizations are turning to artificial intelligence and machine learning (ML) solutions, though the implementation path remains complex and sometimes unclear. 

The session will cover: 

  • Strategies for implementing AI-driven supply chain visibility and predictive analytics;
  • Methods for early detection and mitigation of supply chain vulnerabilities using AI;
  • Frameworks for ensuring accountability and validation in AI-based threat detection systems.

Sudhir Tiku, Vice President and Head – Asia Pacific and China, Bosch

Track A

Sergio Gago

Managing Director AI and Quantum, Moody's Analytics

Eric Harris

CISO, Charlie Norwood VA Medical Center

AI and Supercomputing: The Power of Duo Driving the Future of Tech

Supercomputing, with its immense computational power, is crucial for training complex AI models and processing enormous amounts of data at unprecedented speeds. This partnership has far-reaching implications, from accelerating scientific research to improving real-time analytics across various sectors. This session will delve into the fusion of AI and supercomputing, offering insights into the latest advancements, strategic advantages, and how to harness this powerful combination for innovation.
 
Key Takeaways:
 
  • Supercomputing is pivotal in pushing the boundaries of AI with its ability to facilitate the training of massive models, faster simulations, and sophisticated data analysis, leading to groundbreaking innovations in multiple industries.
  • Real-world use cases demonstrate the intersection of AI and supercomputing in areas such as drug discovery, climate modelling, financial forecasting, and autonomous systems, showcasing how this fusion is reshaping entire sectors.
  • We will address the technical and operational obstacles, including infrastructure costs, energy consumption, and the need for specialized expertise, and provide strategies to overcome these barriers.
  • Gain insights into the future of AI and supercomputing, including emerging technologies like quantum computing and edge AI

Sergio Gago, Managing Director AI and Quantum, Moody’s Analytics
Eric Harris, Charlie Norwood VA Medical Center

Track B

Virtual Summit: Cybersecurity Implications of AI

Simplifying Threat Detection and Response Using AI

Looking ahead to 2025, the use of AI in threat intelligence and automated response will undergo significant transformations, reshaping the tools, strategies and collaborative efforts aimed at combating advanced, AI-driven cyberattacks. Organizations need to adapt their security approaches to stay ahead of evolving threats while ensuring efficient and effective response mechanisms. 

The session will cover: 

  • How to develop predictive threat intelligence frameworks for proactive defense;
  • Methods for integrating AI-powered orchestration across security operations;
  • Best practices for implementing and scaling Detection-as-Code solutions.

Wan Roshaimi Bin Wan Abdullahush Sharma, Chief Technology Officer, CyberSecurity Malaysia

Todd Covert

CISO, National General, Allstate

Suha Can

CISO, Grammarly

AI-Powered Cyber Attacks: Facing the Future of Threats

These AI-enabled cyber threats are not just theoretical; they are already being deployed to automate tasks like vulnerability scanning, phishing, and even bypassing traditional security measures with unprecedented precision. This session will dive into how adversaries are using AI to craft more personalized, adaptive, and stealthy attacks that can outmaneuver conventional defenses. We’ll examine real-world examples of AI-powered attacks an discuss actionable strategies to anticipate and counter these evolving threats. 
 
Key Takeaways: 
 
  •  Identify the New AI Attack Vectors: Gain insight into the latest AI-powered attack vectors, including deepfakes, AI-generated phishing emails, and autonomous malware, and how they differ from traditional cyber threats. 
  • Automation in Cybercrime: Understand how AI is automating and accelerating cyber attacks, enabling adversaries to conduct operations at a scale and speed previously unimaginable. 
  • Adaptive Defenses: Explore proactive defense strategies, including the integration of AI in threat detection, response, and intelligence gathering, to stay ahead of increasingly sophisticated AI-driven threats. 
  • Future-Proofing Security: Learn how to future-proof your organization’s cybersecurity posture by anticipating the next wave of AI-enabled cyber threats and developing resilient, adaptive defenses. 

Todd Covert, CISO, National General, Allstate

 

Suha Can, CISO, Grammarly

Arielle Baine

Chief of Cybersecurity, Region 3, U.S. Department of Homeland Security

Mario Rivas

CISO, Seguros Monterrey New York Life

Collaborating With AI To Enhance Security

This session will explore how AI and human expertise can complement each other, creating a more resilient and adaptive security framework. By leveraging AI’s analytical strengths alongside human intuition and contextual understanding, organizations can enhance their threat detection, response, and mitigation strategies. We will dive into best practices for designing workflows that maximize the strengths of both AI and human analysts, ensuring that your security team remains agile and effective. 
 
You Will Learn: 
 
  • Combining AI and Human Expertise: Understand how to leverage AI’s analytical power and human intuition to enhance threat detection and response capabilities. 
  • Optimizing Workflows: Learn how to design workflows that seamlessly integrate AI tools with human expertise, maximizing the strengths of both. 
  • Training Your Team: Discover best practices for training and adapting your security team to work effectively alongside AI, fostering a culture of collaboration and continuous learning. 

Arielle Baine, Chief of Cybersecurity, Region 3, U.S. Department of

Homeland Security

 

Mario Rivas, CISO, Seguros Monterrey New York Life

John Chan

Director of Technology - AI/ML, Raymond James

Aaron Hand

Chief AI Officer, Arcelor Mittal

Readying the Underlying Technology Infrastructure for Gen AI Adoption

For the success of Gen AI adoption, organizations must ensure that their IT infrastructure can support AI initiatives, including data management systems, computing power, and integration capabilities. 
 
The session will delve into the foundational elements required to build and maintain an AI infrastructure that can scale effectively with increasing data volumes, computational demands, and evolving business needs. It will cover the best practices for integrating scalable computing resources, data management systems, and robust architecture frameworks to ensure long-term AI success. 
 
Key Discussion Points: 
 
  • Assessing the current AI infrastructure for implementing and scaling generative AI.
  • Building a robust data architecture, including data storage, processing, and real-time analytics.
  • Role of cloud to address the compute resources to support gen AI workloads. 
  • Advanced security and compliance measures to protect sensitive data and AI models. 
  • Addressing technology integration and change management issues. 

John Chan, Director of Technology – AI/ML, Raymond James

 

Aaron Hand, Chief AI Officer, Arcelor Mittal

Closing Comments

Editor's Panel

Don’t miss your chance to attend this dynamic impactful event

@ISMG_News

#ISMGSummits

Sponsors

Google-Cloud-Security (1) (1)

The Summit Experience

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Future Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

Katie Jenkins

EVP & CISO , Liberty Mutual Insurance

Threat Intelligence and the Dark Web

In this session, a banking security leader and an FBI agent detail:

  • What the dark web is – and is not;
  • How to gain useful and complete information and apply it;
  • The pros and cons of going solo vs. hiring a service.