may 15, 2025
Cybersecurity Summit Dallas: Data Security
Dallas, TX
On Demand August 16, 2024
Event Overview
The 2025 Cybersecurity Summit in Dallas addresses the new frontier in data security, including the vulnerabilities posed by AI-generated code and the rise of ransomware attacks targeting critical infrastructure. Discussions will highlight the importance of securing non-human identities, ensuring the resilience of cloud-based platforms, and defending against AI-enabled attacks. Attendees will engage with industry experts to learn how to implement comprehensive data protection strategies and adopt proactive threat hunting techniques that stay ahead of ever-evolving attack vectors.
View our ISMG Event Experience video to see what your peers are saying about their participation.Â
View our ISMG Event Experience video to see what your peers are saying about their participation.Â
Highlight Topics
- AI-Generated Code VulnerabilitiesÂ
- Ransomware Targeting Infrastructure
- Securing Non-Human Identities
- Resilient Cloud Platform Defense
Robert Costello
Karen Habercoss
Ginger Armbruster
Tyler Maddry
Lisa Sotto
Kenneth Townsend
E.P. Mathew
Imran Ahmad
John Horn
Heather West
Anahi Santiago
Ray Griffin
Past Speakers
Thought Leaders on Stage Leading Deep-Dive Discussions
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.
Cybersecurity Summit Dallas: Data Security
Inside the Ransomware Battlefield: Former CISO on Defending Critical Infrastructure and Leading Through Crisis
This session will:
- Explore the speaker’s firsthand experience in managing a significant ransomware attack compared to prior training.
- Highlight the importance of communication and showing empathy in incident response.
- Discuss the personal and financial implications of a cyber incident for CISOs, their organizations and customers.
- Emphasize the need for collaboration among legal, compliance and communication stakeholders.
Robert Costello, Chief Information Officer, CISA
Cybersecurity Summit Dallas: Data Security
Strategic Data Security in Capital Markets: Navigating Cyber Risks
Previously regarded as back-office functions, these roles have gained strategic importance due to the growing sophistication of cybercriminals, their advanced tools, and the significant financial implications at stake. Significant cyber risks in the capital markets include:
- Data Breaches and Authentication Weaknesses:Â Insufficient multifactor authentication can result in severe data breaches.
- API Security Flaws:Â The fast pace of digital transformation reveals vulnerabilities in API ecosystems.
- Cloud Security Issues:Â SaaS deployments bring about new security challenges.
- Risks from Third-Party and Fourth-Party Vendors:Â Handling risks from external partners remains a complex issue.
Shaked Rotlevi, Technical Product Marketing Manager, Wiz
Cybersecurity Summit Dallas: Data Security
Navigating the Technical Landscape of AI: Empowering CISOs for Secure Implementation
However, with the tremendous benefits they offer, AI and ML also bring about unique challenges and risks that demand the attention of CISOs.
This session is designed specifically for CISOs seeking to fortify their understanding of AI technologies and their implications on cybersecurity. The session will delve into the technical intricacies of AI systems and explore the pivotal role CISOs play in ensuring a secure and responsible AI implementation within their organizations.
Key topics covered during the session will include:
- Fundamentals of AI and ML:Â Learning core principles and algorithms powering AI and ML that would help CISOs
understand AI-driven app mechanics; - AI in Cybersecurity:Â Exploring the current landscape of AI applications in the realm of cybersecurity, including threat detection, anomaly identification, and risk assessment, along with insights into the potential for AI-driven attacks;
- Data Privacy and Ethics:Â Addressing the ethical considerations and data privacy challenges that arise from AI implementation;
- Adversarial AI and Mitigation Strategies:Â Analyzing the concept of adversarial AI, its potential to subvert AI systems, and best practices for safeguarding AI algorithms from malicious attacks;
- AI Governance and Risk Management:Â Highlighting the significance of comprehensive AI governance frameworks and risk management strategies to mitigate potential AI-related risks effectively;
- Collaborating With AI Teams: Strategies for fostering collaboration between CISOs and AI development teams, facilitating a cohesive approach to security in AI projects.
Tim Gallo, Head of Global Solutions Architects, Google
Â
Cybersecurity Summit Dallas: Data Security
Building an AI-First Organization: Realistic or Hype?
But how realistic is the concept of an AI-first organization where AI is at the core of strategy, operations and culture? The session will look into the practical challenges in effectively integrating AI into the core of their business operations and culture, ensuring it drives measurable value and innovation, and how to address those challenges.Â
Â
Key Discussion Points:Â
- Is “AI-first” organization a realistic and practical approach or simply overhyped;Â
- Challenges around building an “AI-First” organization;Â
- Key aspects of building an AI-first organization and integrating AI across all facets of an organization;Â
- Cultivating an AI-driven culture.Â
Jaimen Hoopes, Vice President of Product Management, Data Security
Solutions
Â
Ronan Murphy, Member of the AI Advisory Council, Government of Ireland
Cybersecurity Summit Dallas: Data Security
Economics of Cloud: Optimizing Spend by Avoiding Ignorance
For decades, the traditional IT models have been based on “owning IT” rather than “consuming IT”. As a result, most enterprises develop business cases and also negotiate contracts that don’t take into account the differential approach specific to cloud. The result: overspending or rising cost of cloud adoption. This raises questions on deriving value from cloud investments which often fell short of expectations and sometimes also resulting into reverse migration to on-prem.
The session will focus on cloud economics and optimizing investments as well as how to avoid the classic mistakes such as undefined cloud road map, miscalculated cloud forecasts and undefined business case, among others.
The session will cover:
- Understanding cloud cost factors;
- Practical cost-optimization strategies;
- The importance of visibility and monitoring;
- The importance of cloud governance.
Liquian Lim, Senior Product Marketing Manager, Snyk
Cybersecurity Summit Dallas: Data Security
Cybersecurity Summit Dallas: Data Security
Harnessing AI in Cybersecurity: Lessons from the C-Suite
- Real-world deployment: Delve into how top organizations have successfully integrated AI into their security operations, highlighting the decision-making processes, implementation strategies, and adjustments made to align AI initiatives with security goals.
- Navigating challenges: Unpack the hurdles encountered by CISOs in adopting AI, from overcoming data bias and ensuring privacy to securing AI systems against adversarial attacks, and the practical solutions that were employed.
- Mitigating risks: Gain actionable insights into the risk management practices refined through firsthand experiences, including the development of robust frameworks to assess and mitigate the unique risks posed by AI.
- Adapting to an AI-driven security landscape: Learn from the foresight and adaptability of leading security practitioners as they prepare their organizations for the future, ensuring resilience against the evolving threat landscape influenced by AI.
Imran Ahmad, Partner/Canadian Head of Technology, Norton Rose
Fulbright
Â
Ray Griffin, CISO and Head of Information Security, Cox Media Group
Â
John Horn, Director, Cybersecurity Practice, Datos Insights
Â
Shervin Evans, Information Security Officer, Deltec Bank & Trust Limited
Cybersecurity Summit Dallas: Data Security
Cloud Leadership: Tapping the Forces of Change for Business Acceleration
By embracing the power of the cloud, organizations can accelerate business growth, enhance agility, and stay ahead in an increasingly digital landscape. Effective cloud leaders understand the potential of cloud technology, drive strategic initiatives and empower their organizations to tap into the transformative capabilities offered by the cloud.
The session will explore the concept of cloud leadership and highlight the key factors that enable organizations to leverage cloud computing for competitive advantage.
Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik
Cybersecurity Summit Dallas: Data Security
Aligning Cloud Strategy with AI-Adoption: Are CIOs Cashing on the Opportunity?
Various cloud computing models have played a vital role in shaping the use of AI use cases for the real world. Moreover, edge computing, which extends the cloud capabilities to on premises with low latency will further help in developing more practical use cases. More recently, large language models have made to the headlines and the fundamental layer to build those is cloud computing.
The session will discuss how CIOs are tweaking their cloud computing framework to accelerate the practical application of new AI technologies, including generative AI.
The session will cover:Â Â
- The growing influence of AI and enterprise response;
- Need for augmenting cloud infrastructure for optimal performance;
- Challenges in aligning AI and cloud strategies.
Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity
Practice, Hunton Andrews Kurth LLP
Â
Tyler Maddry, Partner, Hunton Andrews Kurth LLP
Cybersecurity Summit Dallas: Data Security
Enhancing Collaborative Risk Management: Unifying the Approach to Fraud, Cyber, and Tech Risks
The panel will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective response to threats, aligning different departments under a unified risk management objective.
In this discussion, our esteemed panel will:
- Examine the collaborative frameworks that enable CISOs and IT teams to seamlessly integrate security measures with everyday IT operations.
- Highlight success stories that showcase the benefits of these partnerships, emphasizing efficient risk mitigation and the development of a robust cybersecurity culture.
- Offer insights on how to establish a shared language for risk communication, the formation of interdisciplinary teams, and the importance of vigilant monitoring and rapid response systems.
- Discuss the critical role of CISOs in championing security investments and the necessity of executive support to foster an organizational environment that prioritizes cybersecurity awareness.
John Banghart, Senior Director for Cybersecurity Services, Venable LLP
David Anderson, Vice President, Cyber, Woodruff Sawyer
Anahi Santiago, CISO, ChristianaCare
Â
Cybersecurity Summit Dallas: Data Security
Cybersecurity Summit Dallas: Data Security
From Attack to Recovery: Incident Response in Ransomware Scenarios
As a precursor to an interactive incident response workshop, learn from industry leaders who have faced and defended against the pervasive threat of ransomware attacks firsthand. Attendees will hone their knowledge of ransomware attacks and their organisations’ potential vulnerabilities as they prepare to enter The Solution Room.
Key topics include:
- Learn how to leverage public-private engagement to stay aware of global threats;
- Explore best practices for preparation and response to ransomware attacks while considering their impact on client and proprietary data;
- Identify how to most effectively inform internal stakeholders in case of a security breach;
- Gain a comprehensive understanding of ransomware complexities and develop robust strategies for safeguarding digital assets in the face of this evolving cybercrime.
Ginger Armbruster, Chief Privacy Officer and IT Division Director
Â
Karen Habercoss, Chief Privacy Officer, UChicago Medicine
Cybersecurity Summit Dallas: Data Security
Harnessing AI for Cutting-Edge Threat Detection and Cyber Defense
This transformative approach not only offers actionable intelligence but also enhances overall security resilience. Â
The discussion will cover the integration challenges, practical applications and strategies for using AI to improve cybersecurity defenses, providing CIOs and CISOs with the insights needed to stay ahead.Â
The session will cover:Â
- The role of AI in detecting sophisticated cyberthreats;Â
- Integration of AI with traditional cybersecurity measures;Â
- Real-world AI applications and success stories.Â
- Â
Bill Foster, U.S. Representative, Illinois 11th Congressional District
Don’t miss your chance to attend this dynamic impactful event
#ISMGSummit
@ISMG_News
Sponsors
The Summit Experience
CPE Credits
ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Future Events
October 23, 2024
October 24, 2024
Katie Jenkins
Threat Intelligence and the Dark Web
In this session, a banking security leader and an FBI agent detail:
- What the dark web is – and is not;
- How to gain useful and complete information and apply it;
- The pros and cons of going solo vs. hiring a service.