Highlight Topics
- Enhancing Your Security Posture
- Third Party Risk Management
- Cyber Governance
- 5G Network Security and Business Opportunities
- Zero Trust
Seattle
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
We will also tackle the potential for inherent biases within AI algorithms and their impact on fairness and equity. The discussion aims to provide CISOs with a framework for ethical AI deployment that upholds the integrity of their fraud prevention efforts.
Key Discussion Points:
This session will explore the security applications of these technologies while advocating for data security vigilance. Attention will be given to critical areas prone to risks, alongside actionable strategies to reduce such vulnerabilities.
Key areas of focus will include:
As CISO’s, understanding and effectively leveraging the human factor of AI is critical for a robust cybersecurity frameworks that address the complex challenges of today’s threat landscape.
This session is tailored to equip CISOs with insights into the dynamic interplay between human expertise and AI technologies in the context of cybersecurity. It will explore how the synergy between human intelligence and AI can bolster the organization’s defenses, enhance incident response and create a more resilient cybersecurity posture.
Key themes to be covered during the session include:
What is a Solution Room?
The Solution Room is a highly engaging and interactive conference session that aims to provide cybersecurity leaders with peer-to-peer support and subject matter expertise to tackle their most pressing challenges. Through a combination of small group discussions, expert moderators, and support from U.S. Secret Service Agents, attendees will work through the lifecycle of a Business Email Compromise (BEC) attack.
What does participation in the Solution Room look like?
To enhance your learning experience, we invite you to join one of the ten tables for this collaborative session. Each table will be moderated by a knowledgeable CyberEdBoard member, and a U.S. Secret Service Agent will be present to provide valuable insights into law enforcement partnerships during a compromise.
To kick off the session, Tom Field, Senior Vice President of Editorial at ISMG, will set the stage with a fictitious Business Email Compromise (BEC) scenario. Each group will receive identical sets of questions and work collaboratively to find the answers. As the exercise progresses, new information will be revealed, adding unexpected twists and turns to the scenario. Through this dynamic approach, participants will be challenged to apply critical thinking skills and work as a cohesive team to effectively respond to the evolving situation. Our goal is to provide a stimulating and engaging learning experience that equips you with the skills and knowledge needed to handle real-world BEC scenarios.
These transformative technologies hold great potential for enhancing efficiency, automation and decision-making processes. But with the tremendous benefits they offer, AI and ML also bring about unique challenges and risks that demand the attention of chief information security officers.
This session is designed specifically for CISOs seeking to fortify their understanding of AI technologies and their implications on cybersecurity. Key topics covered during the session will include:
As organizations undergo more digital transformation, there is a greater focus on digitalizing processes and improving customer experiences. Consequently, the roles of CIOs and CISOs are evolving to new archetypes such as business enabler, digital enabler and value enabler.
Partnerships with the CIO and other business heads are imperative to drive business goals. The CIO and CISO are now partners in a mission to drive business enablement and to defend the organization from threats.
In this fireside chat, the participants will discuss:
Evolving roles and business-facing responsibilities;
Supporting other business heads;
Cybersecurity – from a cost center to business enabler.
Cyber insurance, when properly deployed, can help avoid and respond to incidents, as well as reduce the financial impact of such incidents. This session reviews hot topics in cyber insurance, and provides a road map to maximizing your insurance recovery in the event of a loss.
Key learning objectives:
How confident are you in determining the right roles, processes, policies, standards, and metrics to guarantee the efficient and effective use of information for your organization to reach its goals?
Join this session to learn how to build a comprehensive data governance valuation program – regardless of whether your organization has a data governance officer or not:
RSVP here to attend our events. You can select for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Future Events