August 19-20, 2025

Virtual Summit: Cybersecurity Implications of AI

Virtual Event

On Demand August 20, 2025

Event Overview

The Virtual AI Summit by ISMG delves into a dynamic exploration of the intersection between AI and cybersecurity. Take a deep dive into ethical considerations, LLM security, and the intricate impacts on privacy and intellectual property. Engage directly with industry leaders to uncover the synergy between human intelligence and AI in fortifying cybersecurity, with a special focus on AI-driven threat detection and risk management strategies. This summit equips security professionals with vital AI insights, promoting transparent governance and hands-on application through sessions dedicated to real-world cybersecurity challenges. Expect a day packed with strategic dialogues, invaluable insights, and collaborative exploration at the forefront of AI and cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

  • Leveraging AI for Defense
  • Balancing Privacy and Compliance
  • Secure AI Integration
  • Combating Threats With AI
  • Diverse Industry AI Applications

Robert Costello

Chief Information Officer, CISA

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Ginger Armbruster

Chief Privacy Officer and IT Division Director, City of Seattle, WA

Tyler Maddry

Partner, Hunton Andrews Kurth LLP

Lisa Sotto

Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP

Kenneth Townsend

CISO, Ingredion

E.P. Mathew

Deputy CIO, Defense Intelligence Agency

Imran Ahmad

Partner/Canadian Head of Technology, Norton Rose Fulbright

John Horn

Director, Cybersecurity Practice, Datos Insights

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

Anahi Santiago

CISO, ChristianaCare

Ray Griffin

CISO and Head of Information Security, Cox Media Group

2024 Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Past Agenda

Opening Remarks

Virtual AI Cybersecurity Summit

AI Under Control: How CISOs Can Govern, Oversee, and Secure AI-Powered Cybersecurity

While AI-driven systems can significantly enhance threat detection, automate responses, and analyze vast amounts of data faster than ever before, they also present a host of new challenges for CISOs. As cybercriminals increasingly weaponize AI for sophisticated attacks—from automated phishing campaigns to deepfake fraud—the risk to organizations’ security is rising. Additionally, algorithmic bias and adversarial attacks targeting AI models can introduce significant vulnerabilities, undermining the fairness and effectiveness of automated decisions. This makes AI governance, transparency, and human oversight critical to maintaining security and trust in AI systems.
 
In this keynote, we’ll discuss how CISOs can ensure AI systems are secure, ethical, and aligned with regulatory requirements. With AI now central to business and security operations, this session will explore strategies to navigate the challenges of 2025 and beyond while ensuring AI is deployed safely and responsibly.
 
As AI becomes increasingly central to cybersecurity, the ability to govern, oversee, and secure AI systems will be crucial for CISOs to ensure their organizations stay ahead of potential risks. This session will provide the insights and tools needed to navigate the complex challenges of managing AI in cybersecurity in 2025 and beyond.
 
Key Takeaways:
  • CISOs must manage bias, preserve auditability, and react to changing regulations—especially in sensitive industries—to limit risks and safeguard reputation as AI transforms cybersecurity.
  • From adversarial attacks to the potential for bias in AI systems, CISOs need to adopt strategies to handle the unique risks posed by AI. A balance of AI’s capabilities and human oversight is key to ensuring secure, fair, and reliable decision-making.
  • Given AI’s impact on sectors like healthcare, finance, and public safety, CISOs must ensure these systems are explainable and auditable. Prioritizing transparency helps build trust with regulators, customers, and internal teams.

Robert Costello, Chief Information Officer, CISA

Virtual AI Cybersecurity Summit

AI-Driven Leadership: Accelerating Business Growth and Security Innovation

As cyber threats escalate, from ransomware to advanced phishing and supply chain breaches, AI is stepping up as the game-changer leaders need to tackle complex challenges head-on.
 
This discussion will explore how AI is empowering businesses to not only defend against cyberattacks but also fuel growth and drive innovation. With cybercrime becoming more sophisticated and breaches occurring at an alarming rate, AI isn’t just critical for defense—it’s essential for reshaping business leadership. Learn how AI can supercharge your security, streamline operations, and unlock new growth opportunities, positioning your organization for long-term success in a constantly shifting digital environment.
 
Attendees will walk away with practical insights on integrating AI into their cybersecurity strategies. Discover how to strengthen defenses, boost operational efficiency, and drive sustainable innovation, ensuring your business is ready to stay ahead in a fast-paced world where cyber risks and competition are only getting fiercer.
 
We’ll Discuss:
  • Addressing Today’s Leadership Challenges- Cybersecurity leaders are under immense pressure—fiercer competition, escalating cyber risks, and shifting customer demands. In this session, we’ll discuss how AI can help leaders stay ahead of these challenges by transforming security and operations.
  • AI as a Strategic Game-Changer- AI is not just solving problems; it’s reshaping how businesses make decisions and manage risk. Learn how AI is tackling sophisticated threats like adversarial attacks and enhancing decision-making and efficiency in real-time.
  • Evaluating Processes for AI Integration- AI is making an impact across every part of business, but where should you focus? We’ll show you how to evaluate current processes—whether in real-time threat detection, incident response, or customer engagement—and identify where AI can deliver the most value.
  • AI for Innovation and Business Growth- AI isn’t just about security—it’s a powerhouse for driving growth. Learn how AI can help your company stay competitive by accelerating digital transformation, sparking product innovation, and creating personalized customer experiences, all while strengthening security defenses.
 

Shaked Rotlevi, Technical Product Marketing Manager, Wiz

Virtual AI Cybersecurity Summit

Building Resilience Against the Rise of AI-Powered Cyber Threats

Cybercriminals are now leveraging AI to launch attacks with unprecedented speed, precision, and adaptability, creating an environment where traditional security measures are increasingly ineffective. From AI-powered phishing to automated malware deployment, attackers are exploiting machine learning algorithms to bypass conventional defenses.
 
At the same time, AI-driven security systems are emerging as the frontline defenders in this high-stakes cyber arms race, enabling organizations to predict, detect, and neutralize threats at machine speed. As we move into 2026, enterprises must evolve to counter AI-powered adversaries or risk being overwhelmed by the pace of attack innovation. This panel will explore how businesses can build cyber resilience in this AI-driven era, uncovering both the challenges and opportunities AI presents for cybersecurity. In a world where cyber threats are becoming more intelligent and sophisticated, traditional defenses simply aren’t enough.
 
Join us for a critical discussion on how AI is not only reshaping the threats you face but also empowering you to build resilient, future-proof defenses capable of staying ahead in an era of intelligent attacks.
 
Key Discussion Points:
 
  • Understand the dual role of AI as both a weapon for cybercriminals and a powerful tool for defense. Explore the risks of AI-driven attacks and the opportunities for organizations to leverage AI for proactive threat detection and neutralization.
  • Dive into real-world examples of AI-driven cyberattacks, including autonomous botnet networks and deepfake-driven fraud, and discover how these attacks are evolving faster than ever before. Learn the latest countermeasures that are keeping pace with these intelligent threats.
  • Learn how to design adaptive, self-learning defense systems that evolve with the threat landscape. Discover strategies for embedding machine learning into threat intelligence and response systems, ensuring your defenses can anticipate and outsmart evolving AI adversaries.
  • Explore actionable strategies for CISOs to stay one step ahead of AI-powered adversaries. From AI-driven threat modeling to automated security orchestration, learn how to fortify your digital ecosystem and maintain an agile, proactive defense.
 

Tim Gallo, Head of Global Solutions Architects, Google

 

Virtual AI Cybersecurity Summit

Virtual AI Cybersecurity Summit

AI-Powered Code Audits and the New Challenges in Software Security

In 2024, a study found that AI-powered code audits identified 30% more vulnerabilities than traditional methods, yet they also generated an overwhelming number of false positives, making it harder for security teams to separate real threats from noise. At the same time, threat actors are using AI to automate vulnerability discovery, turning software security into a race between defensive and adversarial AI.
 
As organizations integrate AI into secure coding practices, questions remain about how much trust can be placed in automated analysis, how AI can be effectively paired with human expertise, and what security teams must do to mitigate the risks of AI-assisted vulnerability detection. This session will explore how AI is changing secure software development, where it excels, where it falls short, and how organizations should adapt their security processes in response.
 
Key Takeaways:
  • AI vs. Human Code Audits: Understanding AI’s strengths and weaknesses in vulnerability detection.
  • False Positives and Security Debt: How AI-driven tools can overwhelm security teams with non-critical alerts and how to manage the signal-to-noise ratio.
  • Adversarial AI in Code Auditing: How attackers are using AI to automate vulnerability discovery and exploit code faster than ever before.
  • Best Practices for AI-Assisted Secure Development: How organizations can balance AI-driven automation with human expertise to improve software security.
 

Jaimen Hoopes, Vice President of Product Management, Data Security

Solutions

 

Ronan Murphy, Member of the AI Advisory Council, Government of Ireland

Virtual AI Cybersecurity Summit

Safeguarding Your AI Models from Tomorrow's Cyber Threats

With AI models now powering critical security systems, new threats like adversarial attacks, model poisoning, data manipulation, and model theft are rising fast. These vulnerabilities not only compromise AI’s integrity but also open the door to catastrophic financial, operational, and reputational damage. In this session, we’ll dive into the cutting-edge security risks facing AI in cybersecurity and explore proactive, actionable strategies to protect your models from these threats. Learn how to safeguard your AI-driven defenses and ensure they stay resilient, reliable, and ready to tackle the next wave of cyber challenges.
 
It is more important than ever to protect your models from these risks as AI continues to transform cybersecurity. This session will provide you with the skills you need to safeguard your AI models, making sure they continue to be a reliable cornerstone of your defensive plan regardless of what the future brings.  
 
You Will Learn:
  • Get the lowdown on new AI-targeted risks, from adversarial attacks to data poisoning. Discover how to defend against these with advanced techniques like adversarial training and robust input validation to keep your AI models sharp.
  •  Learn how to lock down your AI models with strong access controls, end-to-end encryption, and secure coding practices to prevent unauthorized access, theft, and manipulation.
  • Discover how to implement continuous monitoring, anomaly detection, and secure data pipelines to protect against denial-of-service attacks and ensure the resilience and reliability of your AI models.
  • Get ahead of the regulatory curve by understanding the global landscape of AI security standards and how to align your AI systems with the latest compliance requirements.
 

Liquian Lim, Senior Product Marketing Manager, Snyk

Virtual AI Cybersecurity Summit

Virtual AI Cybersecurity Summit

Virtual AI Cybersecurity Summit

Virtual AI Cybersecurity Summit

Synthetic Identity Fraud and AI's Role in the Fastest-Growing Financial Crime

This sophisticated scheme involves combining real and fictitious information to create fraudulent identities that bypass traditional verification systems. The rise of generative AI has significantly lowered the barrier for criminals to produce convincing synthetic identities at scale, blending stolen personally identifiable information (PII) with fabricated data to exploit financial institutions, government agencies, and online platforms.
 
The financial impact is staggering, with billions lost to synthetic identity fraud annually. High-profile cases, such as deepfake scams impersonating well-known executives, have demonstrated how AI-generated personas can manipulate both financial institutions and consumers. Meanwhile, nearly half of financial institutions have reported incidents involving AI-generated identity fraud, underscoring the urgency of enhanced security measures.
 
This session will explore the escalating threat of AI-driven synthetic identity fraud, examining how criminals are leveraging advanced technologies to create and deploy fraudulent identities.
 
Attendees will gain insights into the latest trends, real-world case studies, and effective strategies for detection and prevention.
 
Discussion Areas:
  • AI-Enhanced Identity Fabrication: How generative AI is being used to construct synthetic identities that evade traditional security checks.
  • Impact on Financial Institutions: The financial and reputational damage caused by synthetic identity fraud and the challenges in detection.
  • Case Studies: How AI-generated deepfake scams and large-scale fraud operations are exposing vulnerabilities in financial and identity verification systems.
  • Preventative Measures: Advanced authentication technologies, cross-industry collaboration, and policy developments aimed at combating this growing threat.
 

Imran Ahmad, Partner/Canadian Head of Technology, Norton Rose

Fulbright

 

Ray Griffin, CISO and Head of Information Security, Cox Media Group

 

John Horn, Director, Cybersecurity Practice, Datos Insights

 

Shervin Evans, Information Security Officer, Deltec Bank & Trust Limited

Virtual AI Cybersecurity Summit

Unleashing the Potential of RAG

RAG seamlessly combines real-time data retrieval with generative AI, providing a dynamic and proactive alternative to traditional AI models that rely on static data and outdated methods. This session is designed to empower cybersecurity professionals with the knowledge to implement RAG, enhancing their security frameworks and transforming their approach to threat defense. Discover how to maximize RAG’s potential to enhance your cybersecurity strategy, outsmart adversaries, and stay ahead of evolving threats. 
 
Embrace the RAG revolution and redefine your cybersecurity posture. This isn’t just an upgrade—it’s a game-changing leap forward. Don’t just keep up with the threats; outpace them with RAG’s advanced, adaptive capabilities. 
 
Key Takeaways: 
  • RAG vs. Traditional AI: A New Standard in Cybersecurity: Learn about the critical differences between RAG and traditional AI models. Understand why RAG’s ability to pull in real-time data sets it apart from conventional AI, which often relies on historical, static datasets. Explore how RAG’s dynamic intelligence empowers faster, more precise decision-making, providing a significant edge over older methods. 
  • Implementing RAG: From Concept to Action: Discover practical steps to integrate RAG into your cybersecurity arsenal. Learn how to select and connect the right data sources, fine-tune generative models, and seamlessly incorporate RAG into your existing security architecture. Gain actionable insights on setting up your RAG-powered system to maximize threat detection, response speed, and overall resilience. 
  • Advanced Threat Intelligence and Adaptive Defense: Experience how RAG’s real-time retrieval capabilities revolutionize threat intelligence by providing highly accurate, context-aware insights from diverse data streams. Unlike traditional AI, RAG evolves continuously, adapting defense strategies to emerging threats, and turning every new data point into a proactive line of defense. 
  • Dynamic, Data-Driven Incident Response: Explore how RAG empowers teams to respond to incidents with unprecedented speed and accuracy. Learn to leverage RAG’s AI-driven recommendations to generate tailored playbooks in real-time, enabling your team to outmaneuver attackers with data-backed strategies that change as fast as the threats do. 
 

Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik

Virtual AI Cybersecurity Summit

Virtual AI Cybersecurity Summit

AI in Red Teaming and the Future of Offensive Security

Organizations are now using AI-driven tools to mimic sophisticated adversaries, automate reconnaissance, and execute adaptive penetration tests that evolve in real time.
 
In 2024, IBM’s red team used AI to identify vulnerabilities in a major tech manufacturer’s infrastructure, uncovering a critical flaw in an HR portal significantly faster than traditional methods. Meanwhile, researchers from Deloitte and Virginia Tech have been exploring reinforcement learning to simulate ransomware attacks, demonstrating how AI can optimize attack paths and refine offensive security strategies. As cybercriminals adopt similar AI-driven techniques, security teams must adapt their defenses to counter AI-assisted threats.
 
This panel will explore how organizations are integrating AI into red teaming, the risks of AI-assisted adversary emulation falling into the wrong hands, and how security teams can adapt their defenses. Attendees will gain insights into real-world cases, ethical considerations, and the future of AI in offensive security testing.
 
Discussion Areas:
  • AI-Driven Adversary Emulation: How AI is being used to simulate APT tactics, automate penetration testing, and enhance reconnaissance.
  • AI vs. Human-Led Red Teaming: What AI is improving, where it still falls short, and how to balance automation with human expertise.
  • The Security Risks of AI-Assisted Offense: What happens when cybercriminals use AI-driven red teaming techniques to refine their attacks before launching them.
  • Defensive Countermeasures: How security teams can adapt to AI-assisted threats and leverage AI for proactive defense.
 

Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity

Practice, Hunton Andrews Kurth LLP

 

Tyler Maddry, Partner, Hunton Andrews Kurth LLP

Track A

Securing the Road: Why Vulnerabilities in Electric Logging Devices are Everyone's Problem

Peeyush Patel

CISO, XPO

Jeremy Daily

Associate Professor, Colorado State University
This session, tailored for CISOs and cybersecurity leaders across various industries, will provide crucial insights into these vulnerabilities. While the primary focus is on transportation, the speakers’ insights into IoT vulnerabilities, wireless network security, and firmware integrity will be applicable to many sectors, including manufacturing, healthcare, finance, and critical infrastructure. Learn how ELDs, mandated to track driving hours and log critical vehicle data, can be exploited via Bluetooth or Wi-Fi connections, leading to unauthorized control, data manipulation, and malware propagation. These insights are not just crucial for the transportation sector but resonate across all industries reliant on interconnected and IoT systems.
 
The final vulnerability, and perhaps the most concerning, is the potential for a self-propagating truck-to-truck worm, which takes advantage of the inherent networked nature of these devices. Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications.
 
Key takeaways:
 
  • Understanding the parallels between ELD vulnerabilities and broader IoT security challenges affecting various industries;
  • Practical measures to safeguard interconnected systems and prevent widespread operational disruptions;
  • The importance of cross-industry collaboration in tackling emerging cybersecurity threats.
 

Peeyush Patel, CISO, XPO

 

Jeremy Daily, Associate Professor, Colorado State University

Track B

AI in Healthcare: Addressing Bias and Security Risks

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

David Anderson

Vice President, Cyber, Woodruff Sawyer

Anahi Santiago

CISO, ChristianaCare

Alex Vitruk

Senior Associate Attorney, BakerHostetler
However, as AI algorithms increasingly influence medical decision-making, concerns about bias and discrimination have become more apparent. These biases can arise from inherent issues in AI datasets, algorithmic design, and implementation, potentially perpetuating disparities in healthcare delivery and outcomes. This session will delve into the ethical, legal, and security implications of healthcare discrimination facilitated by AI, including the erosion of trust, patient harm, and legal challenges. We will explore how AI’s blind spots can inadvertently reinforce existing biases and how representative datasets can help mitigate these challenges.
 
Join us to examine the following key areas:
 
  • Biases in AI datasets: Understand how biases in training data can lead to unequal healthcare outcomes and discuss the importance of using diverse and representative datasets.
  • Algorithmic design, implementation and security: Analyze how design choices and system vulnerabilities can influence the fairness and safety of AI applications.
  • Mitigation and protection strategies: Discuss effective strategies to mitigate bias in AI healthcare applications, emphasizing the need for ongoing oversight, ethical standards, and robust security measures to ensure equitable and ethical use of AI in healthcare.
 

Heather West, Senior Director, Cybersecurity and Privacy Services, Venable

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

Alex Vitruk, Senior Associate Attorney, BakerHostetler

Virtual AI Cybersecurity Summit

Virtual AI Cybersecurity Summit

Virtual AI Cybersecurity Summit

AI in Healthcare: Addressing Bias and Security Risks

This session will delve into the ethical, legal, and security implications of healthcare discrimination facilitated by AI, including the erosion of trust, patient harm, and legal challenges. We will explore how AI’s blind spots can inadvertently reinforce existing biases and how representative datasets can help mitigate these challenges.
 
Join us to examine the following key areas:
 
  • Biases in AI Datasets: Understand how biases in training data can lead to unequal healthcare outcomes and discuss the importance of using diverse and representative datasets.
  • Algorithmic Design, Implementation, and Security: Analyze how design choices and system vulnerabilities can influence the fairness and safety of AI applications.
  • Mitigation and Protection Strategies: Discuss effective strategies to mitigate bias in AI healthcare applications, emphasizing the need for ongoing oversight, ethical standards, and robust security measures to ensure equitable and ethical use of AI in healthcare.

John Banghart, Senior Director for Cybersecurity Services, Venable LLP

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

 

Virtual AI Cybersecurity Summit

Virtual AI Cybersecurity Summit

Privacy & Compliance in the Age of AI

As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy.

This session will address the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session will serve as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations.

Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, the discussion aims to shape a responsible and privacy-conscious approach to AI deployment. 

Key discussion points:

  • Privacy-preserving AI techniques: Explore cutting-edge techniques and technologies designed to enable the use of AI without compromising individual privacy, including federated learning, homomorphic encryption, and other approaches that allow AI models to be trained without accessing raw, sensitive data.
  • Consent and data governance: Examine the role of informed consent in the context of AI applications, best practices for transparently obtaining user consent, and strategies for effective data governance in compliance with evolving privacy regulations.
  • Accountability and transparency in AI practices: Discuss the importance of implementing accountability measures and ensuring transparency in AI operations to build trust and enable verification. Examine frameworks for auditing AI systems, the role of explainable AI in understanding decision-making processes, and policies for addressing biases and errors that impact privacy and data security.

Ginger Armbruster, Chief Privacy Officer and IT Division Director

 

Karen Habercoss, Chief Privacy Officer, UChicago Medicine

Virtual AI Cybersecurity Summit

US Rep. Bill Foster on AI's Regulatory Future

Join us for a thought-provoking discussion that explores the intersection of technology, governance, and the expanding use of artificial intelligence across public and private sectors alike.
 
U.S. Rep. Foster will discuss:
 
  • How Congress, through bipartisan collaboration, is navigating the promises and complexities of AI’s transformative use cases;
  • The strategic initiatives outlined by the Task Force, including guiding principles and forward-looking recommendations;
  • Bipartisan policy proposals developed in consultation with key committees of jurisdiction.

Bill Foster, U.S. Representative, Illinois 11th Congressional District

Closing Comments

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Editor's Panel

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Sponsors

forcepoint

The Summit Experience

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

May 14, 2025

Beyond Human Identity: Tackling the Machine Identity Security Challenge

May 15, 2025

Data Security Summit: Dallas

May 15, 2025

Gen AI in Financial Services: Protecting Users and Data in the Age of Shadow AI

May 20, 2025

IdentityTV

May 22, 2025

Spark USA: The Future of AI-Reinforced Threat Detection

Future Events

May 14, 2025

Beyond Human Identity: Tackling the Machine Identity Security Challenge

May 15, 2025

Data Security Summit: Dallas

May 15, 2025

Gen AI in Financial Services: Protecting Users and Data in the Age of Shadow AI

Katie Jenkins

EVP & CISO , Liberty Mutual Insurance

Threat Intelligence and the Dark Web

In this session, a banking security leader and an FBI agent detail:

  • What the dark web is – and is not;
  • How to gain useful and complete information and apply it;
  • The pros and cons of going solo vs. hiring a service.