April 16, 2024

Cybersecurity Implications of AI Summit: North America West

9:00 AM PT - 5:00 PM PT

Event Overview

The ISMG’s Cybersecurity Implications of AI: North America West Summit offers a comprehensive exploration of AI’s impact on cybersecurity, focusing on ethical considerations, securing LLMs, and the implications for privacy and intellectual property. Participants will engage with industry leaders on the collaboration of human intelligence and AI to enhance cybersecurity measures, including AI-powered threat detection and risk mitigation strategies. The summit provides CISOs with essential insights into AI, encouraging transparent governance and hands-on application through a Solution Room Workshop, designed to tackle real-world cybersecurity challenges. This event promises a day filled with strategic discussions, invaluable insights, and collaborative exploration at the cutting edge of AI and cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Meydenbauer Center

11100 NE 6th St, Bellevue, WA 98004

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.

Highlight Topics

  • Leveraging AI for Defense
  • Balancing Privacy and Compliance
  • Secure AI Integration
  • Combatting Threats With AI
  • Diverse Industry AI Applications

David Tsao

CISO, Instacart

Erika Voss

Vice President, Information Security, DAT Freight & Analytics

Eric Sanchez

CISO, Kyowa Kirin Pharmaceutical

Jon Washburn

CISO, Stoel Rives

Jerry Cochran

Deputy CIO, Pacific Northwest National Labratory

Bob Ferguson

Attorney General, Washington State

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

Nathan Shaffer

Partner; Intellectual Property Litigator, Orrick Herrington & Sutcliffe

Suha Can

CISO, Grammarly

Nicole Darden Ford

CISO, Nordstrom

Chuck Markarian

CISO, PACCAR

Ginger Armbruster

Chief Privacy Officer and IT Division Director, City of Seattle

Speakers

Thought Leaders Leading Deep-Dive Discussions on Stage

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats 

Sample Agenda

You can now view or download a PDF version of the attendee guide.

Registration & Breakfast

David Tsao

CISO, Instacart

Nicole Darden Ford

CISO, Nordstrom

Suha Can

CISO, Grammarly

Harnessing AI in Cybersecurity: Lessons From the C-Suite

These industry leaders will share their direct experiences, focusing on the transformative role AI plays in enhancing security measures, the challenges of integrating AI into existing frameworks, and the innovative strategies developed to mitigate associated risks.

In this exclusive discussion, panelists will dissect specific instances where AI technologies were leveraged to detect threats, streamline incident response, and predict vulnerabilities within their organizations. The discussion will navigate through the complexities of AI adoption, spotlighting the critical balance between leveraging AI for its groundbreaking potential and addressing the ethical, technical, and security challenges it introduces.
Attendees will leave with a comprehensive perspective on strategic AI integration, including:

  • Real-World Deployment: Delve into how top organizations have successfully integrated AI into their security operations, highlighting the decision-making processes, implementation strategies, and adjustments made to align AI initiatives with security goals.
  • Navigating Challenges: Unpack the hurdles encountered by CISOs in adopting AI, from overcoming data bias and ensuring privacy to securing AI systems against adversarial attacks, and the practical solutions that were employed.
  • Mitigating Risks: Gain actionable insights into the risk management practices refined through firsthand experiences, including the development of robust frameworks to assess and mitigate the unique risks posed by AI.
  • Adapting to an AI-Driven Security Landscape: Learn from the foresight and adaptability of leading security practitioners as they prepare their organizations for the future, ensuring resilience against the evolving threat landscape influenced by AI.
 

Nicole Darden Ford, CISO, Nordstrom

David Tsao, CISO, Instacart

Suha Can, CISO, Grammarly

Ginger Armbruster

Chief Privacy Officer and IT Division Director, City of Seattle

Ojas Rege

GM, Privacy and Data Governance Cloud, OneTrust

Jerry Cochran

Deputy CIO, Pacific Northwest National Laboratory

Privacy and Compliance in the Age of AI

As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy.

This session addresses the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session serves as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations. Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, our discussion aims to shape a responsible and privacy-conscious approach to AI deployment.

Key Discussion Points:

  • Privacy-Preserving AI Techniques: Explore cutting-edge techniques and technologies designed to enable the use of AI without compromising individual privacy, including federated learning, homomorphic encryption, and other approaches that allow AI models to be trained without accessing raw, sensitive data.
  • Consent and Data Governance: Examine the role of informed consent in the context of AI applications, best practices for transparently obtaining user consent, and strategies for effective data governance in compliance with evolving privacy regulations.
  • Accountability and Transparency in AI Practices: Discuss the importance of implementing accountability measures and ensuring transparency in AI operations to build trust and enable verification. Examine frameworks for auditing AI systems, the role of explainable AI in understanding decision-making processes, and policies for addressing biases and errors that impact privacy and data security.

Ginger Armbruster, Chief Privacy Officer and IT Division Director, City of Seattle

Ojas Rege, GM, Privacy and Data Governance Cloud, OneTrust

Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory

Bob Ferguson

Attorney General, Washington State

Artificial Intelligence and Public Policy: Attorney General Bob Ferguson's Vision for Washington’s AI Task Force

Highlighting the task force’s mandate, he will delve into the critical areas of public policy and the importance of maintaining racial equity and civil liberties in the face of AI advancements. Ferguson’s talk will also touch on the broader context of AI regulation and innovation, reflecting on how the task force’s work compares with similar efforts in other states and addresses the unique challenges and opportunities presented by AI technologies.

The session promises insightful perspectives on proactive governance and the role of bipartisan collaboration in shaping the future of AI in Washington and beyond.

Bob Ferguson, Attorney General, Washington State

Kayne McGladrey

Field CISO, Hyperproof

Casey Allen

CIO, Concentric

Best Practices for Maturing Your Security Programs Without Leaving Privacy Behind

Featuring insights from Kayne McGladrey, Field CISO at Hyperproof, and Casey Allen, CIO at Concentric, this discussion will navigate through the intricate landscape of legal, ethical, and technological considerations. From the ramifications of the Karl Lundstrom case for the tech industry to the transformative potential of GPTs in shaping privacy policies and frameworks, the panel will explore pivotal themes shaping the future of privacy and security.

Key Discussion Points:

Legal and Ethical Implications: Analyze the broader impacts of high-profile legal cases on the tech industry’s approach to AI tool utilization and data privacy, offering guidance for mitigating internal risks.
Harnessing GPTs for Privacy Governance: Discuss the role of Generative Pre-trained Transformers (GPTs) in revolutionizing privacy policy generation and compliance, and their potential to embed privacy by design into the DNA of organizations.
Proactive Privacy Strategies: Explore methodologies for ‘shifting privacy left,’ ensuring privacy considerations are integral to the early phases of system development and deployment.
Innovative Approaches to Privacy Enhancement: Uncover quick wins and strategic initiatives that leading companies are implementing to bolster user privacy, setting new standards for privacy protection in the digital age.

Attendees will leave with a comprehensive understanding of how to navigate the complex interplay between advancing security initiatives and upholding privacy principles, equipped with practical strategies and insights from the forefront of cybersecurity and privacy innovation.

Kayne McGladrey, Field CISO, Hyperproof

Casey Allen, CIO, Concentric

Networking & Exhibition Break

Jake Gillen

Principal Solutions Architect, Expel

Wielding the Double-Edged Sword of AI: Balancing Value With Intrinsic Security Risks

Jake Gillen, Principal Solutions Architect, Expel

Tom Guerrette

Cyber Security Engineer, Infoblox

Greg Simmons

Cyber Security Specialist, Infoblox

Why DNS Should Be Your Security Foundation

Be first in the kill chain without relying on known signature-based attacks, analyzing sandboxed traffic, maintaining an army of security analysts, or being vulnerable to misconfigured systems. Leverage advanced AI/ML models to block connections to malicious domains, rendering malware, phishing, and lookalike domains useless.

Tom Guerrette, Cyber Security Engineer, Infoblox

Greg Simmons, Cyber Security Specialist, Infoblox

Eric Sanchez

CISO, Kyowa Kirin, Inc., U.S.

Jerry Cochran

Deputy CIO, Pacific Northwest National Laboratory

Chuck Markarian

CISO, PACCAR

Adam Zoller

CISO, Providence

Transformative Defense: Utilizing AI to Combat Cyber Threats

Recent trends demonstrate adversaries utilizing AI for complex phishing campaigns, leveraging deepfake technology for identity fraud, and automating vulnerability exploitation. This session focuses on how security leaders can utilize AI technologies to enhance defense capabilities, showcasing AI’s dual potential as both a tool for attackers and a powerful ally in cybersecurity.

 
Key insights include leveraging machine learning for predictive threat detection, employing AI-driven behavioral analytics to identify subtle anomalies in network activity, and leveraging emerging capabilities to improve system robustness. The session aims to provide a strategic blueprint for integrating AI into cybersecurity frameworks, thereby not only countering AI-exploited threats but also setting a new standard for proactive defense.

Key Session Insights: 

  • Predictive Threat Detection: Implement the optimal AI strategy to forecast and neutralize threats before they manifest, drastically reducing the potential impact of cyberattacks.
  • Anomaly Detection Through Behavioral Analytics: Utilize AI to monitor network behavior continuously, enabling the detection of deviations that signify potential security breaches, enhancing the speed and accuracy of response.
  • Collaborative Data Initiatives: An exploration of the significance of data sharing across organizational boundaries, emphasizing the collective strength derived from collaborative defense efforts.
 
This session will empower cybersecurity professionals with actionable strategies for leveraging AI to build more resilient and adaptive security infrastructures, ensuring preparedness against the ever-evolving landscape of AI-exploited cyber threats.

Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory

Chuck Markarian, CISO, PACCAR

Eric Sanchez, CISO, Kyowa Kirin, Inc.- U.S.

Adam Zoller, CISO, Providence

Lunch & Exhibition

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

Jon Washburn

CISO, Stoel Rives

Nathan Shaffer

Partner; Intellectual Property Litigator, Orrick Herrington & Sutcliffe

Strategic Frameworks for Secure AI Deployment: Integrating AIBOMs for Enhanced Trust and Verification

This session addresses the complexities of deploying AI models securely, emphasizing the critical role of artificial intelligence bill of materials, or AIBOMs, in ensuring security, trust, and accuracy.

AIBOMs provide a detailed inventory of components, data sets, and environments involved in AI model development, crucial for oversight and control, especially for third-party AI applications. Unlike Unlike software bills of materials – or SBOMs, AIBOMs include data lineage, model training parameters, and ethical considerations, offering a comprehensive view essential for maintaining transparency and trust.

This exploration into AIBOMs will highlight their importance in an organization’s security posture, detailing practical steps for AI due diligence and third-party AI platform evaluation. The discussion aims to build trust in AI through a focus on technological robustness and the continuous assurance of model accuracy and ethical deployment.

Key Session Insights:

  • Understanding AIBOMs vs. SBOMs: Grasp the differences and the criticality of AIBOMs for a transparent, controlled AI deployment.
  • Building Trust in AI Systems: Explore validation methods for AI system integrity and security, ensuring alignment with organizational values and stakeholder trust.
  • AI Due Diligence Checklist: A guide for information security leaders to rigorously assess AI vendors, with a focus on security, accuracy, and ethical considerations.

Heather West, Senior Director, Cybersecurity and Privacy Services, Venable

Jon Washburn, CISO, Stoel Rives

Nathan Shaffer, Partner; Intellectual Property Litigator, Orrick Herrington & Sutcliffe

Nader Zaveri

Senior Manager - Incident Response & Remediation, Mandiant

Paul Vanderwulp

Special Agent, United States Secret Service

Deep Fakes, Real Stakes: Unmasking Cyber Deception in a High-Stakes Tabletop Simulation

What You Will Gain From This Experience

  • Enhanced Organizational Readiness: To critically assess and improve organizational preparedness in responding to intricate cyber incidents involving deep fake technology and social engineering.
  • Interagency Collaboration and Knowledge Exchange: To strengthen the partnership and information sharing between the U.S. Secret Service and leaders in the private sector cybersecurity community.
  • Strategic Response Development: To create all-encompassing incident response strategies that cover legal, technical, and communicational facets, while also identifying and rectifying weaknesses in existing cybersecurity policies and governance.

Nader Zaveri, Senior Manager – Incident Response & Remediation, Mandiant

Paul Vanderwulp, Special Agent, United States Secret Service

Networking & Exhibition Break

Vinit Tople

Fmr. Head of Gen AI Product Portfolio, Alexa Automotive, Amazon

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

Navigating the Maze: Open Platforms vs. Open Source in LLM Security  

the backdrop of recent inquiries by entities such as the NTIA into the risks and benefits of publicly available model weights, this discussion is timely and essential for information security leaders.

As organizations navigate the decision between open platforms and open-source models, understanding the unique security challenges and opportunities each presents is paramount. This session aims to demystify these distinctions, providing CISOs, CIOs, and VPs of Information Security with a clear road map for assessing and integrating LLM technologies securely into their operations.

Key Takeaways:

  • Comprehensive Risk Analysis: Learn to conduct a thorough security assessment for both open platforms and open-source LLMs, highlighting key vulnerabilities and mitigation strategies.
  • Strategic Implementation Guidance: Gain insights into best practices for safely implementing LLM solutions, whether they are sourced from open platforms or open-source communities, ensuring robust security postures without sacrificing innovation.
  • Regulatory and Compliance Considerations: Understand the evolving regulatory landscape affecting LLM deployments, including how to navigate compliance while leveraging public model weights and contributing to open-source projects.

Heather West, Senior Director, Cybersecurity and Privacy Services, Venable

Vinit Tople, Fmr. Head of Gen AI Product Portfolio, Alexa Automotive, Amazon

Jon Washburn

CISO, Stoel Rives

Erika Voss

Vice President, Information Security, DAT Freight & Analytics

Eric Sanchez

CISO, Kyowa Kirin, Inc.- U.S.

Beyond Silos: AI Adoption Across Industries 

In this open and candid discussion, esteemed information security leaders from diverse fields will offer a panoramic view of AI’s impact across the business spectrum. Participants will benefit from an in-depth exploration of how different industries are not only utilizing AI but also navigating the complexities of its adoption, with a special focus on the lessons learned in the process.

Our closing panel will unveil the nuances of AI integration within their sectors, shedding light on how AI technologies have been implemented to optimize operations, enhance customer experiences, and bolster security postures against increasingly sophisticated threats. More importantly, this session aims to distill the collective experiences of these industry leaders into actionable insights, highlighting the common hurdles encountered during AI adoption, from ethical dilemmas and regulatory challenges to technical obstacles and workforce implications.

Key Session Insights:

  • Industry-Specific Insights: Learn how different industries are leveraging AI for both operational excellence and enhanced security, highlighting innovative uses and strategic deployments.
  • Common Challenges and Solutions: A comprehensive look at shared difficulties, including data privacy concerns, algorithm bias, and the integration with legacy systems, alongside the strategies developed to overcome them.
  • Critical Lessons Learned: Valuable takeaways from each industry’s experience with AI, offering a road map of best practices, cautionary tales, and innovative solutions that have emerged from real-world applications.
  • Forward-Looking Strategies: Gain perspective on future developments of AI in each sector, considering future applications, potential disruptions, and the ongoing need for cross-industry collaboration and learning.

Jon Washburn, CISO, Stoel Rives

Erika Voss, Vice President, Information Security, DAT Freight & Analytics

Eric Sanchez, CISO, Kyowa Kirin, Inc.- U.S.

Closing Comments

Sponsors

Upcoming ISMG Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration

June 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru​

April 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare

Register

RSVP here to attend our events. You can opt for multiple or individual tickets.

NOTE:  All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.