Highlight Topics
- Securing Machine Learning Models
- Detecting AI-Generated Threats
- Managing Non-Human Identities
- AI-Enhanced Data Security
Seattle’s 2025 Cybersecurity Summit focuses on safeguarding sensitive data in an increasingly complex digital environment. With AI rapidly becoming an integral part of enterprise systems, this event will explore securing machine learning models, detecting AI-generated threats, and managing the risks of non-human identities in cloud infrastructures. In light of growing ransomware attacks on critical infrastructure, attendees will gain insights into how AI can be leveraged to strengthen data security and prepare for the next wave of sophisticated cyber threats.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.
The speaker will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective response to threats, aligning different departments under a unified risk management objective.
In this discussion, our esteemed panel will:
John Banghart, Senior Director for Cybersecurity Services, Venable LLP
David Anderson, Vice President, Cyber, Woodruff Sawyer
Anahi Santiago, CISO, ChristianaCare
As a precursor to an interactive incident response workshop, learn from industry leaders who have faced and defended against the pervasive threat of ransomware attacks firsthand. Attendees will hone their knowledge of ransomware attacks and their organisations’ potential vulnerabilities as they prepare to enter The Solution Room.
Key topics include:
Ginger Armbruster, Chief Privacy Officer and IT Division Director
Karen Habercoss, Chief Privacy Officer, UChicago Medicine
But how realistic is the concept of an AI-first organization where AI is at the core of strategy, operations and culture? The session will look into the practical challenges in effectively integrating AI into the core of their business operations and culture, ensuring it drives measurable value and innovation, and how to address those challenges.
Key Discussion Points:
Jaimen Hoopes, Vice President of Product Management, Data Security
Solutions
Ronan Murphy, Member of the AI Advisory Council, Government of Ireland
However, with the tremendous benefits they offer, AI and ML also bring about unique challenges and risks that demand the attention of CISOs.
This session is designed specifically for CISOs seeking to fortify their understanding of AI technologies and their implications on cybersecurity. The session will delve into the technical intricacies of AI systems and explore the pivotal role CISOs play in ensuring a secure and responsible AI implementation within their organizations.
Key topics covered during the session will include:
Tim Gallo, Head of Global Solutions Architects, Google
For decades, the traditional IT models have been based on “owning IT” rather than “consuming IT”. As a result, most enterprises develop business cases and also negotiate contracts that don’t take into account the differential approach specific to cloud. The result: overspending or rising cost of cloud adoption. This raises questions on deriving value from cloud investments which often fell short of expectations and sometimes also resulting into reverse migration to on-prem.
The session will focus on cloud economics and optimizing investments as well as how to avoid the classic mistakes such as undefined cloud road map, miscalculated cloud forecasts and undefined business case, among others.
The session will cover:
Liquian Lim, Senior Product Marketing Manager, Snyk
Various cloud computing models have played a vital role in shaping the use of AI use cases for the real world. Moreover, edge computing, which extends the cloud capabilities to on premises with low latency will further help in developing more practical use cases. More recently, large language models have made to the headlines and the fundamental layer to build those is cloud computing.
The session will discuss how CIOs are tweaking their cloud computing framework to accelerate the practical application of new AI technologies, including generative AI.
The session will cover:
Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity
Practice, Hunton Andrews Kurth LLP
Tyler Maddry, Partner, Hunton Andrews Kurth LLP
By embracing the power of the cloud, organizations can accelerate business growth, enhance agility, and stay ahead in an increasingly digital landscape. Effective cloud leaders understand the potential of cloud technology, drive strategic initiatives and empower their organizations to tap into the transformative capabilities offered by the cloud.
The session will explore the concept of cloud leadership and highlight the key factors that enable organizations to leverage cloud computing for competitive advantage.
Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik
Imran Ahmad, Partner/Canadian Head of Technology, Norton Rose
Fulbright
Ray Griffin, CISO and Head of Information Security, Cox Media Group
John Horn, Director, Cybersecurity Practice, Datos Insights
Shervin Evans, Information Security Officer, Deltec Bank & Trust Limited
This session will:
Robert Costello, Chief Information Officer, CISA
Previously regarded as back-office functions, these roles have gained strategic importance due to the growing sophistication of cybercriminals, their advanced tools, and the significant financial implications at stake. Significant cyber risks in the capital markets include:
Shaked Rotlevi, Technical Product Marketing Manager, Wiz
#ISMGSummit
@ISMG_News
ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Future Events
Future Events
In this session, a banking security leader and an FBI agent detail: