may 15, 2025
Data Security Summit: Dallas
2ND EDITION | Dallas, TX
On Demand August 16, 2024
Event Overview
The 2025 Cybersecurity Summit in Dallas addresses the new frontier in data security, including the vulnerabilities posed by AI-generated code and the rise of ransomware attacks targeting critical infrastructure. Discussions will highlight the importance of securing non-human identities, ensuring the resilience of cloud-based platforms, and defending against AI-enabled attacks. Attendees will engage with industry experts to learn how to implement comprehensive data protection strategies and adopt proactive threat hunting techniques that stay ahead of ever-evolving attack vectors.
View our ISMG Event Experience video to see what your peers are saying about their participation.Â
Highlight Topics
- AI-Generated Code VulnerabilitiesÂ
- Ransomware Targeting Infrastructure
- Securing Non-Human Identities
- Resilient Cloud Platform Defense
Robert Costello
Karen Habercoss
Ginger Armbruster
Tyler Maddry
Lisa Sotto
Kenneth Townsend
E.P. Mathew
Imran Ahmad
John Horn
Heather West
Anahi Santiago
Ray Griffin
Past Speakers
Thought Leaders on Stage Leading Deep-Dive Discussions
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.
Agenda
Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.
Data Security Summit: Dallas
The CISO's Critical Role in Nurturing Data Security
This session provides practical insights into the strategies, frameworks, and technologies essential for building resilient data security programs.
In today’s environment, CISOs must address emerging challenges, such as securing vast amounts of data generated by IoT devices and ensuring compliance with regional data sovereignty laws. For example, the rise in ransomware attacks targeting healthcare and financial sectors highlights the urgent need for real-time threat detection and robust incident response strategies. This session equips CISOs with actionable approaches to tackle these pressing issues while safeguarding organizational assets.
Key Points:
- Orchestrating Comprehensive Data Protection Measures: Implement robust approaches like end-to-end encryption and role-based access control to maintain the confidentiality and integrity of critical information assets.
- Crafting and Implementing Incident Response and Data Loss Prevention (DLP) Strategies: Utilize advanced threat intelligence and behavior analytics to proactively thwart data breaches and unauthorized disclosures.
- Evaluating and Integrating Emerging Technologies: Leverage innovations such as AI-powered security analytics and blockchain-based data protection to enhance defenses and stay at the forefront of data security advancements.
Robert Costello, Chief Information Officer, CISA
Data Security Summit: Dallas
Data Privacy and Decoupling: Ensuring Compliance and Data Integrity
Decoupling data—separating sensitive data from less critical information—has emerged as a vital approach to maintaining data privacy while meeting the challenges of modern business operations. This session will focus on how CISOs can implement data decoupling and adjust their data architecture to protect sensitive information, ensure compliance with privacy regulations, and reduce the risk of data breaches.Â
Attendees will gain insights into best practices for safeguarding data while maintaining the flexibility to scale operations and adapt to changing regulatory requirements. The session will also explore real-world case studies where organizations have successfully decoupled data, ensuring data privacy and minimizing exposure.Â
Key Discussion Points:Â
- Decoupling Data for Privacy: Strategies to separate sensitive data for improved security and regulatory compliance.
- Adapting to New Privacy Regulations: How businesses can adjust data architecture to stay compliant with global data privacy laws.
- Minimizing Data Breach Risks: Best practices for protecting sensitive information and reducing data breach impacts.
- Case Studies on Data Decoupling: Real-world examples of how companies have implemented data decoupling to protect data privacy.
Shaked Rotlevi, Technical Product Marketing Manager, Wiz
Data Security Summit: Dallas
Uncovering Insider Threats with Behavioral Analytics
Behavioral analytics offers a powerful tool for identifying subtle activity changes that could indicate malicious actions or unintentional risks before they evolve into serious breaches.
This session will dive into advanced methods for applying behavioral analytics to insider threat detection, including leveraging machine learning, anomaly detection algorithms, and seamless integration with existing security tools. Through real-world examples, CISOs will explore how this technology can uncover suspicious access patterns and unusual data transfers, delivering proactive defenses against insider threats.
Key Technical Takeaways:
- Machine Learning for Behavioral Insights: How to train models that pinpoint deviations in user activity across diverse systems.
- Real-Time Detection: Implementing anomaly detection techniques to identify irregularities as they occur.
- Integration with SIEM and SOAR: Using behavioral data to enhance automation and incident response workflows.
- Case Studies: Technical analysis of successful behavioral analytics implementations, emphasizing reduced false positives and operational gains.
Â
Tim Gallo, Head of Global Solutions Architects, Google
Â
Data Security Summit: Dallas
Managing the Expanding Attack Surface in a Hyper-Connected World
Attack Surface Management (ASM) has become a critical tool for maintaining visibility over this expanding digital ecosystem. Recent high-profile breaches—like the April 2024 Sisense breach, where attackers exploited compromised GitLab credentials to infiltrate cloud storage—underscore the importance of managing the attack surface to prevent exploitation.Â
This session will focus on how CISOs can implement ASM strategies to secure digital assets, drawing on recent case studies like the Sisense incident and the SolarWinds breach. We’ll cover how attackers identified and exploited weak points in external-facing assets and how ASM tools can help preempt similar threats.Â
Â
We Will Discuss:Â
- Comprehensive Asset Discovery: How ASM tools provide continuous mapping of external-facing assets, including cloud services and shadow IT, to prevent blind spots, as illustrated in the Sisense and SolarWinds breaches.
- Real-Time Vulnerability Detection: Learn from recent incidents how misconfigurations and unpatched vulnerabilities became entry points for attackers, and how ASM can detect these issues in real-time.
- Risk Prioritization and Response Automation: Using machine learning to identify the most critical vulnerabilities and reduce response times, based on insights from breaches where faster detection could have minimized damage.
- Integration with SIEM and SOAR: Explore how ASM tools can seamlessly integrate with broader security systems to enhance real-time threat detection, drawing on lessons learned from recent breaches.
Jaimen Hoopes, Vice President of Product Management, Data Security
Solutions
Â
Ronan Murphy, Member of the AI Advisory Council, Government of Ireland
Data Security Summit: Dallas
Building a Resilient Data Security Strategy
CISOs face the challenge of securing information across diverse environments while meeting stringent compliance requirements and maintaining operational continuity.
This session will explore how to construct a robust data security framework using advanced detection capabilities, adaptive access controls, and scalable defenses for cloud-native, hybrid, and legacy systems. Attendees will gain insights into the latest innovations in threat detection, data protection, and compliance strategies that reinforce organizational resilience against insider and external risks.
Key Takeaways:
- Layered Defenses for Complex Systems: Designing multi-faceted protection strategies that secure the data lifecycle across distributed infrastructures.
- AI-Powered Anomaly Detection: Applying advanced algorithms to identify unusual activity, prevent breaches, and mitigate evolving threats.
- Next-Generation Access Controls: Enforcing least-privilege policies with dynamic authentication tailored to hybrid and cloud-native environments.
- Proactive Compliance Strategies: Meeting evolving mandates like GDPR and HIPAA while building trust with stakeholders and customers.
Liquian Lim, Senior Product Marketing Manager, Snyk
Data Security Summit: Dallas
Data Security Summit: Dallas
Agentic AI and the Future of Autonomy in Security
Agentic AI introduces autonomous systems capable of executing complex tasks, making decisions, and collaborating with other AI agents—all without human intervention. These systems go beyond prediction and content generation, offering organizations the ability to automate workflows, improve efficiency, and adapt to dynamic challenges with unprecedented agility.Â
While the potential benefits of agentic AI are vast, its rise also introduces new risks. As autonomous agents take on critical roles
across industries, questions around security, accountability, and ethical governance come to the forefront. How can organizations ensure these systems operate safely within established parameters? What vulnerabilities might emerge as agentic AI becomes a target for exploitation? This session will examine the dual impact of agentic AI on business innovation and security resilience, offering practical insights for leveraging its power while safeguarding against misuse.Â
Â
Key Takeaways:Â
- Understand how agentic AI differs from previous waves of AI and its implications for business operations and security.
- Explore strategies for securely integrating autonomous agents into critical workflows.
- Identify emerging vulnerabilities posed by agentic AI and how to mitigate them effectively.
- Discuss ethical and regulatory considerations essential for the responsible deployment of agentic AI.
Imran Ahmad, Partner/Canadian Head of Technology, Norton Rose
Fulbright
Â
Data Security Summit: Dallas
A New Era of Data Privacy Compliance in Texas
The TDPSA grants Texans unprecedented control over their personal data, mandates transparency from all businesses, and requires rigorous new standards for data security. For cybersecurity teams, this law signals a high-stakes shift, where compliance means more than just policies—it’s about building resilient, adaptive security into every layer of data management.Â
Texas has created a rigorous data protection environment, driving cybersecurity to prioritize ongoing, proactive protection and compliance. In 2025 and beyond, the TDPSA will reshape cybersecurity strategy, making collaboration, transparency, and resilient security the cornerstones of modern data privacy. Compliance is now an ongoing commitment, reshaping how organizations protect data in Texas and setting a new standard for privacy across the nation.Â
Key Takeaways:
- Texans can now access, correct, delete, and opt out of personal data use. Cybersecurity must implement secure, user-friendly systems that make it easy to fulfil these rights, ensuring smooth compliance.
- “Reasonable” security measures under TDPSA are now a must. This means implementing solid auditing, rapid breach responses, and comprehensive access controls to keep data secure.
- Businesses must provide clear, accessible disclosures about data use. Cybersecurity needs to work hand-in-hand with legal and data teams to ensure transparency in privacy policies and consent practices, keeping them compliant and understandable.
Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik
Data Security Summit: Dallas
Safeguarding Data Across the Oil and Gas Value Chain - From Wellhead to Wallet
From exploration and production to transportation and refining, the sector handles massive amounts of sensitive data, ranging from seismic surveys to pipeline monitoring systems. Cybercriminals and state-sponsored actors continue to exploit vulnerabilities at every stage of the value chain, often targeting operational technology (OT) systems that were not originally designed with cybersecurity in mind. As incidents like ransomware attacks on pipelines demonstrate, breaches in this sector can have devastating operational, environmental, and economic consequences.
This session will provide a comprehensive exploration of the cybersecurity challenges facing the oil and gas industry. Attendees will learn about vulnerabilities specific to upstream, midstream, and downstream operations, with real-world examples of recent attacks and lessons learned. The panel will discuss strategies for integrating IT and OT security, leveraging advanced threat detection technologies, and protecting the proprietary and operational data that fuels the energy sector.
Discussion Points:
- Key vulnerabilities across upstream, midstream, and downstream oil and gas operations.
- Real-world case studies of cyberattacks on the energy sector and lessons learned.
- Strategies for securing operational technology (OT) systems and bridging IT/OT gaps.
- Best practices for enhancing resilience against nation-state and criminal cyber threats.Â
Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity
Practice, Hunton Andrews Kurth LLP
Â
Tyler Maddry, Partner, Hunton Andrews Kurth LLP
Data Security Summit: Dallas
Building Intelligent Data Infrastructure: Unlocking Cross-Industry Potential
From healthcare to financial services, companies must rethink their data management strategies to drive efficiency, security, and innovation. A modern data infrastructure can transform raw data into a powerful resource, optimizing performance and enabling smarter decision-making while safeguarding sensitive information. Whether you’re looking to modernize your data strategy or protect critical assets, this session offers practical insights to help you build a data infrastructure designed to meet the challenges and opportunities ahead.
This session will explore the components of a resilient, secure, and scalable data infrastructure, highlighting how intelligent systems can deliver actionable insights, automate workflows, and meet the growing needs of diverse sectors.
Key topics include:
- Leveraging AI for Efficiency: How intelligent systems can streamline operations and generate insights that lead to better business outcomes.
- Enhancing Security: Approaches for embedding strong security measures directly into your data infrastructure to protect against emerging threats.
- Scalability for the Future: Developing a flexible and adaptable infrastructure capable of evolving with your business needs and handling increasingly complex workloads.
John Banghart, Senior Director for Cybersecurity Services, Venable LLP
David Anderson, Vice President, Cyber, Woodruff Sawyer
Anahi Santiago, CISO, ChristianaCare
Â
Data Security Summit: Dallas
Data Security Summit: Dallas
From Attack to Recovery: Incident Response in Ransomware Scenarios
As a precursor to an interactive incident response workshop, learn from industry leaders who have faced and defended against the pervasive threat of ransomware attacks firsthand. Attendees will hone their knowledge of ransomware attacks and their organisations’ potential vulnerabilities as they prepare to enter The Solution Room.
Key topics include:
- Learn how to leverage public-private engagement to stay aware of global threats;
- Explore best practices for preparation and response to ransomware attacks while considering their impact on client and proprietary data;
- Identify how to most effectively inform internal stakeholders in case of a security breach;
- Gain a comprehensive understanding of ransomware complexities and develop robust strategies for safeguarding digital assets in the face of this evolving cybercrime.
Ginger Armbruster, Chief Privacy Officer and IT Division Director
Â
Karen Habercoss, Chief Privacy Officer, UChicago Medicine
Data Security Summit: Dallas
Harnessing AI for Cutting-Edge Threat Detection and Cyber Defense
This transformative approach not only offers actionable intelligence but also enhances overall security resilience. Â
The discussion will cover the integration challenges, practical applications and strategies for using AI to improve cybersecurity defenses, providing CIOs and CISOs with the insights needed to stay ahead.Â
The session will cover:Â
- The role of AI in detecting sophisticated cyberthreats;Â
- Integration of AI with traditional cybersecurity measures;Â
- Real-world AI applications and success stories.Â
Bill Foster, U.S. Representative, Illinois 11th Congressional District
Don’t miss your chance to attend this dynamic impactful event
#ISMGSummit
@ISMG_News
Sponsors
CPE Credits
ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
The Summit Experience
Future Events
January 28, 2025
January 30, 2025
Future Events