june 10, 2025

Cybersecurity Summit Seattle: Data Security

Seattle, WA

On Demand August 16, 2024

Event Overview

Seattle’s 2025 Cybersecurity Summit focuses on safeguarding sensitive data in an increasingly complex digital environment. With AI rapidly becoming an integral part of enterprise systems, this event will explore securing machine learning models, detecting AI-generated threats, and managing the risks of non-human identities in cloud infrastructures. In light of growing ransomware attacks on critical infrastructure, attendees will gain insights into how AI can be leveraged to strengthen data security and prepare for the next wave of sophisticated cyber threats.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

  • Securing Machine Learning Models
  • Detecting AI-Generated Threats
  • Managing Non-Human Identities
  •  AI-Enhanced Data Security 

Robert Costello

Chief Information Officer, CISA

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Ginger Armbruster

Chief Privacy Officer and IT Division Director, City of Seattle, WA

Tyler Maddry

Partner, Hunton Andrews Kurth LLP

Lisa Sotto

Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP

Kenneth Townsend

CISO, Ingredion

E.P. Mathew

Deputy CIO, Defense Intelligence Agency

Imran Ahmad

Partner/Canadian Head of Technology, Norton Rose Fulbright

John Horn

Director, Cybersecurity Practice, Datos Insights

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

Anahi Santiago

CISO, ChristianaCare

Ray Griffin

CISO and Head of Information Security, Cox Media Group

Past Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda

Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.

Cybersecurity Summit Dallas: Data Security

Enhancing Collaborative Risk Management: Unifying the Approach to Fraud, Cyber, and Tech Risks

The speaker will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective response to threats, aligning different departments under a unified risk management objective.
In this discussion, our esteemed panel will:

  • Examine the collaborative frameworks that enable CISOs and IT teams to seamlessly integrate security measures with everyday IT operations.
  • Highlight success stories that showcase the benefits of these partnerships, emphasizing efficient risk mitigation and the development of a robust cybersecurity culture.
  • Offer insights on how to establish a shared language for risk communication, the formation of interdisciplinary teams, and the importance of vigilant monitoring and rapid response systems.
  • Discuss the critical role of CISOs in championing security investments and the necessity of executive support to foster an organizational environment that prioritizes cybersecurity awareness.

John Banghart, Senior Director for Cybersecurity Services, Venable LLP

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

 

Cybersecurity Summit Dallas: Data Security

Cybersecurity Summit Dallas: Data Security

From Attack to Recovery: Incident Response in Ransomware Scenarios

As a precursor to an interactive incident response workshop, learn from industry leaders who have faced and defended against the pervasive threat of ransomware attacks firsthand. Attendees will hone their knowledge of ransomware attacks and their organisations’ potential vulnerabilities as they prepare to enter The Solution Room.

Key topics include:

  • Learn how to leverage public-private engagement to stay aware of global threats;
  • Explore best practices for preparation and response to ransomware attacks while considering their impact on client and proprietary data;
  • Identify how to most effectively inform internal stakeholders in case of a security breach;
  • Gain a comprehensive understanding of ransomware complexities and develop robust strategies for safeguarding digital assets in the face of this evolving cybercrime.

Ginger Armbruster, Chief Privacy Officer and IT Division Director

 

Karen Habercoss, Chief Privacy Officer, UChicago Medicine

Cybersecurity Summit Dallas: Data Security

Building an AI-First Organization: Realistic or Hype?

But how realistic is the concept of an AI-first organization where AI is at the core of strategy, operations and culture? The session will look into the practical challenges in effectively integrating AI into the core of their business operations and culture, ensuring it drives measurable value and innovation, and how to address those challenges. 

 

Key Discussion Points: 

  • Is “AI-first” organization a realistic and practical approach or simply overhyped; 
  • Challenges around building an “AI-First” organization; 
  • Key aspects of building an AI-first organization and integrating AI across all facets of an organization; 
  • Cultivating an AI-driven culture. 

Jaimen Hoopes, Vice President of Product Management, Data Security

Solutions

 

Ronan Murphy, Member of the AI Advisory Council, Government of Ireland

Networking Break

Cybersecurity Summit Dallas: Data Security

Navigating the Technical Landscape of AI: Empowering CISOs for Secure Implementation

However, with the tremendous benefits they offer, AI and ML also bring about unique challenges and risks that demand the attention of CISOs.

This session is designed specifically for CISOs seeking to fortify their understanding of AI technologies and their implications on cybersecurity. The session will delve into the technical intricacies of AI systems and explore the pivotal role CISOs play in ensuring a secure and responsible AI implementation within their organizations.

Key topics covered during the session will include:

  • Fundamentals of AI and ML: Learning core principles and algorithms powering AI and ML that would help CISOs
    understand AI-driven app mechanics;
  • AI in Cybersecurity: Exploring the current landscape of AI applications in the realm of cybersecurity, including threat detection, anomaly identification, and risk assessment, along with insights into the potential for AI-driven attacks;
  • Data Privacy and Ethics: Addressing the ethical considerations and data privacy challenges that arise from AI implementation;
  • Adversarial AI and Mitigation Strategies: Analyzing the concept of adversarial AI, its potential to subvert AI systems, and best practices for safeguarding AI algorithms from malicious attacks;
  • AI Governance and Risk Management: Highlighting the significance of comprehensive AI governance frameworks and risk management strategies to mitigate potential AI-related risks effectively;
  • Collaborating With AI Teams: Strategies for fostering collaboration between CISOs and AI development teams, facilitating a cohesive approach to security in AI projects.

Tim Gallo, Head of Global Solutions Architects, Google

 

Cybersecurity Summit Dallas: Data Security

Economics of Cloud: Optimizing Spend by Avoiding Ignorance

For decades, the traditional IT models have been based on “owning IT” rather than “consuming IT”. As a result, most enterprises develop business cases and also negotiate contracts that don’t take into account the differential approach specific to cloud. The result: overspending or rising cost of cloud adoption. This raises questions on deriving value from cloud investments which often fell short of expectations and sometimes also resulting into reverse migration to on-prem.

The session will focus on cloud economics and optimizing investments as well as how to avoid the classic mistakes such as undefined cloud road map, miscalculated cloud forecasts and undefined business case, among others.

The session will cover:

  • Understanding cloud cost factors;
  • Practical cost-optimization strategies;
  • The importance of visibility and monitoring;
  • The importance of cloud governance.

Liquian Lim, Senior Product Marketing Manager, Snyk

Cybersecurity Summit Dallas: Data Security

Aligning Cloud Strategy with AI-Adoption: Are CIOs Cashing on the Opportunity?

Various cloud computing models have played a vital role in shaping the use of AI use cases for the real world. Moreover, edge computing, which extends the cloud capabilities to on premises with low latency will further help in developing more practical use cases. More recently, large language models have made to the headlines and the fundamental layer to build those is cloud computing.

The session will discuss how CIOs are tweaking their cloud computing framework to accelerate the practical application of new AI technologies, including generative AI.

The session will cover:  

  • The growing influence of AI and enterprise response;
  • Need for augmenting cloud infrastructure for optimal performance;
  • Challenges in aligning AI and cloud strategies.

Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity

Practice, Hunton Andrews Kurth LLP

 

Tyler Maddry, Partner, Hunton Andrews Kurth LLP

Cybersecurity Summit Dallas: Data Security

Cloud Leadership: Tapping the Forces of Change for Business Acceleration

By embracing the power of the cloud, organizations can accelerate business growth, enhance agility, and stay ahead in an increasingly digital landscape. Effective cloud leaders understand the potential of cloud technology, drive strategic initiatives and empower their organizations to tap into the transformative capabilities offered by the cloud.

The session will explore the concept of cloud leadership and highlight the key factors that enable organizations to leverage cloud computing for competitive advantage.

Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik

Networking Break

Cybersecurity Summit Dallas: Data Security

Cybersecurity Summit Dallas: Data Security

Harnessing AI in Cybersecurity: Lessons from the C-Suite

Our panel of leading CISOs will offer an unfiltered glimpse into the strategic deployment of AI by information security practitioners. These industry leaders will share their direct experiences, focusing on the transformative role AI plays in enhancing security measures, the challenges of integrating AI into existing frameworks, and the innovative strategies developed to mitigate associated risks. Attendees will leave with a comprehensive perspective on strategic AI integration, including:
 
  • Real-world deployment: Delve into how top organizations have successfully integrated AI into their security operations, highlighting the decision-making processes, implementation strategies, and adjustments made to align AI initiatives with security goals.
  • Navigating challenges: Unpack the hurdles encountered by CISOs in adopting AI, from overcoming data bias and ensuring privacy to securing AI systems against adversarial attacks, and the practical solutions that were employed.
  • Mitigating risks: Gain actionable insights into the risk management practices refined through firsthand experiences, including the development of robust frameworks to assess and mitigate the unique risks posed by AI.
  • Adapting to an AI-driven security landscape: Learn from the foresight and adaptability of leading security practitioners as they prepare their organizations for the future, ensuring resilience against the evolving threat landscape influenced by AI.

Imran Ahmad, Partner/Canadian Head of Technology, Norton Rose

Fulbright

 

Ray Griffin, CISO and Head of Information Security, Cox Media Group

 

John Horn, Director, Cybersecurity Practice, Datos Insights

 

Shervin Evans, Information Security Officer, Deltec Bank & Trust Limited

Cybersecurity Summit Dallas: Data Security

Inside the Ransomware Battlefield: Former CISO on Defending Critical Infrastructure and Leading Through Crisis

Discover how to strengthen your organization’s resilience by learning directly from those who have navigated these intense challenges, offering you practical strategies and invaluable lessons for future preparedness. 

This session will:

  • Explore the speaker’s firsthand experience in managing a significant ransomware attack compared to prior training.
  • Highlight the importance of communication and showing empathy in incident response.
  • Discuss the personal and financial implications of a cyber incident for CISOs, their organizations and customers.
  • Emphasize the need for collaboration among legal, compliance and communication stakeholders.

Robert Costello, Chief Information Officer, CISA

Cybersecurity Summit Dallas: Data Security

Strategic Data Security in Capital Markets: Navigating Cyber Risks

Previously regarded as back-office functions, these roles have gained strategic importance due to the growing sophistication of cybercriminals, their advanced tools, and the significant financial implications at stake. Significant cyber risks in the capital markets include:
  • Data Breaches and Authentication Weaknesses: Insufficient multifactor authentication can result in severe data breaches.
  • API Security Flaws: The fast pace of digital transformation reveals vulnerabilities in API ecosystems.
  • Cloud Security Issues: SaaS deployments bring about new security challenges.
  • Risks from Third-Party and Fourth-Party Vendors: Handling risks from external partners remains a complex issue.

Shaked Rotlevi, Technical Product Marketing Manager, Wiz

Closing Comments

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Past Summit Sponsors

expel

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

The Summit Experience

Future Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Future Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

Katie Jenkins

EVP & CISO , Liberty Mutual Insurance

Threat Intelligence and the Dark Web

In this session, a banking security leader and an FBI agent detail:

  • What the dark web is – and is not;
  • How to gain useful and complete information and apply it;
  • The pros and cons of going solo vs. hiring a service.