August 19-20, 2025

Virtual Summit: Cybersecurity Implications of AI

AMERICAS | EMEA | APAC

On Demand August 20, 2025

Event Overview

The Virtual AI Summit by ISMG delves into a dynamic exploration of the intersection between AI and cybersecurity. Take a deep dive into ethical considerations, LLM security, and the intricate impacts on privacy and intellectual property. Engage directly with industry leaders to uncover the synergy between human intelligence and AI in fortifying cybersecurity, with a special focus on AI-driven threat detection and risk management strategies. This summit equips security professionals with vital AI insights, promoting transparent governance and hands-on application through sessions dedicated to real-world cybersecurity challenges. Expect a day packed with strategic dialogues, invaluable insights, and collaborative exploration at the forefront of AI and cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

  • Leveraging AI for Defense
  • Balancing Privacy and Compliance
  • Secure AI Integration
  • Combating Threats With AI
  • Diverse Industry AI Applications

Seth Frimpong-Manso

CISO, Access Bank (Ghana) Plc

Nim Nadarajah

CISO, HOVR

Sandra Pesic

Information Security and Data Privacy Officer, Federal Reserve Bank of Chicago

Sarah Matthews

Group Responsible AI Manager, The Adecco Group

Priya Dank

Data Scientist & AI Strategist, Airbus

Kenneth Townsend

CISO, Ingredion

Brennan Lodge

Director of Information Security, Manhattan Institute

Emma Verghagen

Global Technology Portfolio & Demand Director, Unilever

Naveen Ullkashi

CISO, Allianz Direct

Shing-hon Lau

Senior Cybersecurity Engineer, Software Engineering Institute

Russ Ayers

Deputy CISO of Cyber, Equifax

Jason Smith

CDO & AI Strategy Lead, Publicis Media

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Tune in to the event, and choose the topics that matter most to you - whether you're looking from outside of your geography, or want to see how thought leaders are navigating the distinct challenges in your region.

North America Track: 10:00 AM - 4:30 PM ET
EMEA Track: 10:00 - 16:30 CET
APAC Track: 10:00 - 16:30 SGT

10:00 AM - 10:30 am ET

AI Under Control: How CISOs Can Govern, Oversee, and Secure AI-Powered Cybersecurity

While AI-driven systems can significantly enhance threat detection, automate responses, and analyze vast amounts of data faster than ever before, they also present a host of new challenges for CISOs. As cybercriminals increasingly weaponize AI for sophisticated attacks—from automated phishing campaigns to deepfake fraud—the risk to organizations’ security is rising. Additionally, algorithmic bias and adversarial attacks targeting AI models can introduce significant vulnerabilities, undermining the fairness and effectiveness of automated decisions. This makes AI governance, transparency, and human oversight critical to maintaining security and trust in AI systems.
 
In this keynote, we’ll discuss how CISOs can ensure AI systems are secure, ethical, and aligned with regulatory requirements. With AI now central to business and security operations, this session will explore strategies to navigate the challenges of 2025 and beyond while ensuring AI is deployed safely and responsibly.
 
As AI becomes increasingly central to cybersecurity, the ability to govern, oversee, and secure AI systems will be crucial for CISOs to ensure their organizations stay ahead of potential risks. This session will provide the insights and tools needed to navigate the complex challenges of managing AI in cybersecurity in 2025 and beyond.
 
Key Takeaways:
  • CISOs must manage bias, preserve auditability, and react to changing regulations—especially in sensitive industries—to limit risks and safeguard reputation as AI transforms cybersecurity.
  • From adversarial attacks to the potential for bias in AI systems, CISOs need to adopt strategies to handle the unique risks posed by AI. A balance of AI’s capabilities and human oversight is key to ensuring secure, fair, and reliable decision-making.
  • Given AI’s impact on sectors like healthcare, finance, and public safety, CISOs must ensure these systems are explainable and auditable. Prioritizing transparency helps build trust with regulators, customers, and internal teams.

Sekhar Nagasundaram

Global Head of Cybersecurity Threat & Cyberdefense, US

Kirsty Kelly

Group CISO, CFC, EMEA

Hemant Baidwan

CISO, U.S. Department of Homeland Security

10:30 AM - 11:30 AM ET

AI-Driven Leadership: Accelerating Business Growth and Security Innovation

As cyber threats escalate, from ransomware to advanced phishing and supply chain breaches, AI is stepping up as the game-changer leaders need to tackle complex challenges head-on.
 
This discussion will explore how AI is empowering businesses to not only defend against cyberattacks but also fuel growth and drive innovation. With cybercrime becoming more sophisticated and breaches occurring at an alarming rate, AI isn’t just critical for defense—it’s essential for reshaping business leadership. Learn how AI can supercharge your security, streamline operations, and unlock new growth opportunities, positioning your organization for long-term success in a constantly shifting digital environment.
 
Attendees will walk away with practical insights on integrating AI into their cybersecurity strategies. Discover how to strengthen defenses, boost operational efficiency, and drive sustainable innovation, ensuring your business is ready to stay ahead in a fast-paced world where cyber risks and competition are only getting fiercer.
 
We’ll Discuss:
  • Addressing Today’s Leadership Challenges- Cybersecurity leaders are under immense pressure—fiercer competition, escalating cyber risks, and shifting customer demands. In this session, we’ll discuss how AI can help leaders stay ahead of these challenges by transforming security and operations.
  • AI as a Strategic Game-Changer- AI is not just solving problems; it’s reshaping how businesses make decisions and manage risk. Learn how AI is tackling sophisticated threats like adversarial attacks and enhancing decision-making and efficiency in real-time.
  • Evaluating Processes for AI Integration- AI is making an impact across every part of business, but where should you focus? We’ll show you how to evaluate current processes—whether in real-time threat detection, incident response, or customer engagement—and identify where AI can deliver the most value.
  • AI for Innovation and Business Growth- AI isn’t just about security—it’s a powerhouse for driving growth. Learn how AI can help your company stay competitive by accelerating digital transformation, sparking product innovation, and creating personalized customer experiences, all while strengthening security defenses.
 

Kenneth Townsend

CISO, Ingredion, Inc.

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

11:30 AM - 12:30 PM ET

Building Resilience Against the Rise of AI-Powered Cyber Threats

Cybercriminals are now leveraging AI to launch attacks with unprecedented speed, precision, and adaptability, creating an environment where traditional security measures are increasingly ineffective. From AI-powered phishing to automated malware deployment, attackers are exploiting machine learning algorithms to bypass conventional defenses.
 
At the same time, AI-driven security systems are emerging as the frontline defenders in this high-stakes cyber arms race, enabling organizations to predict, detect, and neutralize threats at machine speed. As we move into 2026, enterprises must evolve to counter AI-powered adversaries or risk being overwhelmed by the pace of attack innovation. This panel will explore how businesses can build cyber resilience in this AI-driven era, uncovering both the challenges and opportunities AI presents for cybersecurity. In a world where cyber threats are becoming more intelligent and sophisticated, traditional defenses simply aren’t enough.
 
Join us for a critical discussion on how AI is not only reshaping the threats you face but also empowering you to build resilient, future-proof defenses capable of staying ahead in an era of intelligent attacks.
 
Key Discussion Points:
 
  • Understand the dual role of AI as both a weapon for cybercriminals and a powerful tool for defense. Explore the risks of AI-driven attacks and the opportunities for organizations to leverage AI for proactive threat detection and neutralization.
  • Dive into real-world examples of AI-driven cyberattacks, including autonomous botnet networks and deepfake-driven fraud, and discover how these attacks are evolving faster than ever before. Learn the latest countermeasures that are keeping pace with these intelligent threats.
  • Learn how to design adaptive, self-learning defense systems that evolve with the threat landscape. Discover strategies for embedding machine learning into threat intelligence and response systems, ensuring your defenses can anticipate and outsmart evolving AI adversaries.
  • Explore actionable strategies for CISOs to stay one step ahead of AI-powered adversaries. From AI-driven threat modeling to automated security orchestration, learn how to fortify your digital ecosystem and maintain an agile, proactive defense.

. 

Nim Nadarajah

CISO, HOVR

Sandra Pesic

Information Security and Data Privacy Officer, Federal Reserve Bank of Chicago

1:30 PM - 2:30 PM

AI-Powered Code Audits and the New Challenges in Software Security

In 2024, a study found that AI-powered code audits identified 30% more vulnerabilities than traditional methods, yet they also generated an overwhelming number of false positives, making it harder for security teams to separate real threats from noise. At the same time, threat actors are using AI to automate vulnerability discovery, turning software security into a race between defensive and adversarial AI.
 
As organizations integrate AI into secure coding practices, questions remain about how much trust can be placed in automated analysis, how AI can be effectively paired with human expertise, and what security teams must do to mitigate the risks of AI-assisted vulnerability detection. This session will explore how AI is changing secure software development, where it excels, where it falls short, and how organizations should adapt their security processes in response.
 
Key Takeaways:
  • AI vs. Human Code Audits: Understanding AI’s strengths and weaknesses in vulnerability detection.
  • False Positives and Security Debt: How AI-driven tools can overwhelm security teams with non-critical alerts and how to manage the signal-to-noise ratio.
  • Adversarial AI in Code Auditing: How attackers are using AI to automate vulnerability discovery and exploit code faster than ever before.
  • Best Practices for AI-Assisted Secure Development: How organizations can balance AI-driven automation with human expertise to improve software security.

Vipul Gupta

SVP, Director of Information Security, Frost

2:30 PM - 3:00 PM ET

Safeguarding Your AI Models from Tomorrow's Cyber Threats

With AI models now powering critical security systems, new threats like adversarial attacks, model poisoning, data manipulation, and model theft are rising fast. These vulnerabilities not only compromise AI’s integrity but also open the door to catastrophic financial, operational, and reputational damage. In this session, we’ll dive into the cutting-edge security risks facing AI in cybersecurity and explore proactive, actionable strategies to protect your models from these threats. Learn how to safeguard your AI-driven defenses and ensure they stay resilient, reliable, and ready to tackle the next wave of cyber challenges.
 
It is more important than ever to protect your models from these risks as AI continues to transform cybersecurity. This session will provide you with the skills you need to safeguard your AI models, making sure they continue to be a reliable cornerstone of your defensive plan regardless of what the future brings.  
 
You Will Learn:
  • Get the lowdown on new AI-targeted risks, from adversarial attacks to data poisoning. Discover how to defend against these with advanced techniques like adversarial training and robust input validation to keep your AI models sharp.
  •  Learn how to lock down your AI models with strong access controls, end-to-end encryption, and secure coding practices to prevent unauthorized access, theft, and manipulation.
  • Discover how to implement continuous monitoring, anomaly detection, and secure data pipelines to protect against denial-of-service attacks and ensure the resilience and reliability of your AI models.
  • Get ahead of the regulatory curve by understanding the global landscape of AI security standards and how to align your AI systems with the latest compliance requirements.
 

Shing-hon Lau

Senior Cybersecurity Engineer, Software Engineering Institute, Carnegie Mellon University

3:00 pm - 3:30 pm et

Synthetic Identity Fraud and AI's Role in the Fastest-Growing Financial Crime

This sophisticated scheme involves combining real and fictitious information to create fraudulent identities that bypass traditional verification systems. The rise of generative AI has significantly lowered the barrier for criminals to produce convincing synthetic identities at scale, blending stolen personally identifiable information (PII) with fabricated data to exploit financial institutions, government agencies, and online platforms.
 
The financial impact is staggering, with billions lost to synthetic identity fraud annually. High-profile cases, such as deepfake scams impersonating well-known executives, have demonstrated how AI-generated personas can manipulate both financial institutions and consumers. Meanwhile, nearly half of financial institutions have reported incidents involving AI-generated identity fraud, underscoring the urgency of enhanced security measures.
 
This session will explore the escalating threat of AI-driven synthetic identity fraud, examining how criminals are leveraging advanced technologies to create and deploy fraudulent identities.
 
Attendees will gain insights into the latest trends, real-world case studies, and effective strategies for detection and prevention.
 
Discussion Areas:
  • AI-Enhanced Identity Fabrication: How generative AI is being used to construct synthetic identities that evade traditional security checks.
  • Impact on Financial Institutions: The financial and reputational damage caused by synthetic identity fraud and the challenges in detection.
  • Case Studies: How AI-generated deepfake scams and large-scale fraud operations are exposing vulnerabilities in financial and identity verification systems.
  • Preventative Measures: Advanced authentication technologies, cross-industry collaboration, and policy developments aimed at combating this growing threat.

Sateesh Kumar Challa

Head of Digital Transformation Office, Societe Generale

3:30 pm - 4:00 pm et

Unleashing the Potential of RAG

RAG seamlessly combines real-time data retrieval with generative AI, providing a dynamic and proactive alternative to traditional AI models that rely on static data and outdated methods. This session is designed to empower cybersecurity professionals with the knowledge to implement RAG, enhancing their security frameworks and transforming their approach to threat defense. Discover how to maximize RAG’s potential to enhance your cybersecurity strategy, outsmart adversaries, and stay ahead of evolving threats. 
 
Embrace the RAG revolution and redefine your cybersecurity posture. This isn’t just an upgrade—it’s a game-changing leap forward. Don’t just keep up with the threats; outpace them with RAG’s advanced, adaptive capabilities. 
 
Key Takeaways: 
  • RAG vs. Traditional AI: A New Standard in Cybersecurity: Learn about the critical differences between RAG and traditional AI models. Understand why RAG’s ability to pull in real-time data sets it apart from conventional AI, which often relies on historical, static datasets. Explore how RAG’s dynamic intelligence empowers faster, more precise decision-making, providing a significant edge over older methods. 
  • Implementing RAG: From Concept to Action: Discover practical steps to integrate RAG into your cybersecurity arsenal. Learn how to select and connect the right data sources, fine-tune generative models, and seamlessly incorporate RAG into your existing security architecture. Gain actionable insights on setting up your RAG-powered system to maximize threat detection, response speed, and overall resilience. 
  • Advanced Threat Intelligence and Adaptive Defense: Experience how RAG’s real-time retrieval capabilities revolutionize threat intelligence by providing highly accurate, context-aware insights from diverse data streams. Unlike traditional AI, RAG evolves continuously, adapting defense strategies to emerging threats, and turning every new data point into a proactive line of defense. 
  • Dynamic, Data-Driven Incident Response: Explore how RAG empowers teams to respond to incidents with unprecedented speed and accuracy. Learn to leverage RAG’s AI-driven recommendations to generate tailored playbooks in real-time, enabling your team to outmaneuver attackers with data-backed strategies that change as fast as the threats do. 
 

Taka Ariga

Former Chief AI and Data Officer, U.S. Officer of Personnel Management

Brennan Lodge

Director of Information Security, Manhattan Institute

4:00 pm - 4:30 pm et

AI in Red Teaming and the Future of Offensive Security

Organizations are now using AI-driven tools to mimic sophisticated adversaries, automate reconnaissance, and execute adaptive penetration tests that evolve in real time.
 
In 2024, IBM’s red team used AI to identify vulnerabilities in a major tech manufacturer’s infrastructure, uncovering a critical flaw in an HR portal significantly faster than traditional methods. Meanwhile, researchers from Deloitte and Virginia Tech have been exploring reinforcement learning to simulate ransomware attacks, demonstrating how AI can optimize attack paths and refine offensive security strategies. As cybercriminals adopt similar AI-driven techniques, security teams must adapt their defenses to counter AI-assisted threats.
 
This panel will explore how organizations are integrating AI into red teaming, the risks of AI-assisted adversary emulation falling into the wrong hands, and how security teams can adapt their defenses. Attendees will gain insights into real-world cases, ethical considerations, and the future of AI in offensive security testing.
 
Discussion Areas:
  • AI-Driven Adversary Emulation: How AI is being used to simulate APT tactics, automate penetration testing, and enhance reconnaissance.
  • AI vs. Human-Led Red Teaming: What AI is improving, where it still falls short, and how to balance automation with human expertise.
  • The Security Risks of AI-Assisted Offense: What happens when cybercriminals use AI-driven red teaming techniques to refine their attacks before launching them.
  • Defensive Countermeasures: How security teams can adapt to AI-assisted threats and leverage AI for proactive defense.

Russ Ayres

Deputy CISO, Head of Cyber, Equifax

10:00 AM - 10:30 am

AI in Healthcare: Address Bias and Security Risks

This session will delve into the ethical, legal, and security implications of healthcare discrimination facilitated by AI, including the erosion of trust, patient harm, and legal challenges. We will explore how AI’s blind spots can inadvertently reinforce existing biases and how representative datasets can help mitigate these challenges.
 
Join us to examine the following key areas:
 
  • Biases in AI Datasets: Understand how biases in training data can lead to unequal healthcare outcomes and discuss the importance of using diverse and representative datasets.
  • Algorithmic Design, Implementation, and Security: Analyze how design choices and system vulnerabilities can influence the fairness and safety of AI applications.
  • Mitigation and Protection Strategies: Discuss effective strategies to mitigate bias in AI healthcare applications, emphasizing the need for ongoing oversight, ethical standards, and robust security measures to ensure equitable and ethical use of AI in healthcare.

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

10:00 - 11:00 CET

AI Under Control: How CISOs Can Govern, Oversee, and Secure AI-Powered Cybersecurity

While AI-driven systems can significantly enhance threat detection, automate responses, and analyze vast amounts of data faster than ever before, they also present a host of new challenges for CISOs. As cybercriminals increasingly weaponize AI for sophisticated attacks—from automated phishing campaigns to deepfake fraud—the risk to organizations’ security is rising. Additionally, algorithmic bias and adversarial attacks targeting AI models can introduce significant vulnerabilities, undermining the fairness and effectiveness of automated decisions. This makes AI governance, transparency, and human oversight critical to maintaining security and trust in AI systems.
 
In this keynote, we’ll discuss how CISOs can ensure AI systems are secure, ethical, and aligned with regulatory requirements. With AI now central to business and security operations, this session will explore strategies to navigate the challenges of 2025 and beyond while ensuring AI is deployed safely and responsibly.
 
 
As AI becomes increasingly central to cybersecurity, the ability to govern, oversee, and secure AI systems will be crucial for CISOs to ensure their organizations stay ahead of potential risks. This session will provide the insights and tools needed to navigate the complex challenges of managing AI in cybersecurity in 2025 and beyond.
 
Key Takeaways:
 
  • CISOs must manage bias, preserve auditability, and react to changing regulations—especially in sensitive industries—to limit risks and safeguard reputation as AI transforms cybersecurity.
  • From adversarial attacks to the potential for bias in AI systems, CISOs need to adopt strategies to handle the unique risks posed by AI. A balance of AI’s capabilities and human oversight is key to ensuring secure, fair, and reliable decision-making.
  • Given AI’s impact on sectors like healthcare, finance, and public safety, CISOs must ensure these systems are explainable and auditable. Prioritizing transparency helps build trust with regulators, customers, and internal teams.

Sekhar Nagasundaram

Global Head of Cybersecurity Threat & Cyberdefense, Elevance Health

Kirsty Kelly

Group CISO, CFC

Hemant Baidwan

CISO, U.S. Department of Homeland Security

11:00 - 12:00 cet

How Generative AI is Reinventing Cybersecurity Across Europe

From ransomware attacks to data theft, enterprises face a constant battle against cybercriminals. The solution? Generative AI. This groundbreaking technology is transforming how businesses protect themselves, providing faster, smarter defenses against the ever-growing volume of cyberattacks.
 
Join us for a high-impact panel discussion where AI experts and industry leaders showcase how Generative AI is reshaping cybersecurity for enterprises across Europe. Learn how businesses in sectors like finance, healthcare, and manufacturing are using AI to detect and neutralize threats—from spear phishing to malware attacks—before they cause major damage.
 
Generative AI is no longer a luxury; it’s a must-have for European enterprises looking to stay ahead of the rapidly changing cyber threat landscape. In the battle against cybercrime, AI is the ultimate weapon for businesses to stay secure and proactive in an ever-evolving digital world.
 
Key Takeaways:
  • Discover how European enterprises are integrating Generative AI into their security strategies to enhance real-time threat detection and response. AI is becoming a critical tool to spot anomalies, predict attacks, and stop them before they escalate.
  • Dive into case studies where AI has successfully mitigated cyber risks. From protecting sensitive customer data in France’s banking sector to securing cloud-based systems in Germany, AI is proving invaluable in defending against the latest cyberattack techniques.
  • Understand how Generative AI enables enterprises to scale their security measures as they grow, adapting seamlessly to an ever-evolving digital landscape. Whether it’s across multiple locations or a range of complex systems, AI is the key to agile, robust defense.
  • Get ahead of the curve with insights into AI’s next frontier in cybersecurity. From automated incident response to AI-powered threat intelligence, these innovations are transforming how enterprises prepare for and recover from cyberattacks.

Aaron Kalvani

Global AI Transformation Leader, United Nations

Naveen Ullkashi

CISO, Allianz Direct

12:00 - 12:30 CET

Ensuring AI Integrity in EMEA: Addressing Data Governance, Compliance, and Trust in AI

Businesses must manage complicated regulatory environments while preserving AI-driven efficiency and competitive advantage in light of the EU AI Act, GDPR, and other regional regulations that tighten oversight. However, the integrity of AI is fundamentally tied to the quality and governance of the data that powers it. From mitigating biases in AI-driven decisions to preventing security threats such as adversarial attacks and model manipulation, data leaders must proactively embed governance, transparency, and ethical AI principles into their strategies.
 
This panel will explore how organisations can build AI systems that foster trust, meet compliance requirements, and drive sustainable business value in an era where AI integrity is no longer optional but a boardroom imperative.
 
Key Takeaways:
  • AI Governance as a Competitive Advantage: Organisations that embed AI governance into their broader data strategy will not only ensure regulatory compliance but also gain a strategic edge by enhancing brand trust, reducing operational risks, and fostering responsible AI adoption. Strong governance frameworks enable businesses to scale AI with confidence, aligning innovation with accountability.
  • Mitigating Bias and Ensuring Fair AI: AI models inherit biases from historical data, leading to potential risks in hiring, lending, and customer engagement. By implementing proactive data governance measures such as bias audits, diverse and representative training datasets, and human-in-the-loop oversight, organisations can prevent AI-driven discrimination, safeguard brand reputation, and strengthen ethical AI adoption.
  • Balancing AI Innovation with Security & Compliance: As AI security threats grow, including adversarial attacks, model poisoning, and data manipulation, businesses must extend cybersecurity principles to AI systems. Integrating AI security into broader data protection strategies, deploying automated compliance monitoring, and enforcing stringent access controls will be crucial to mitigating risks while staying ahead of regulatory changes in the EMEA region.

Kshitjia Joshi

Vice President (Data & AI Solutions), Chief Data Officer, Nomura International

Kam Karaji

Director Cybersecurity & Risk Management, NFL

Priyanka Dank

Data Scientist & AI Strategist, Airbus

13:30 - 14:30 CET

Scaling AI Successfully: Overcoming Technical and Cultural Barriers for Enterprise Growth

Challenges such as outdated IT architectures, fragmented data ecosystems, regulatory complexities, and organizational resistance often prevent AI initiatives from scaling beyond isolated pilot projects. To drive meaningful business impact, AI must be embedded into core operational and strategic frameworks rather than confined to experimental use cases. This requires a holistic approach that aligns people, processes, and platforms while ensuring AI systems remain ethical, transparent, and compliant with evolving global regulations like GDPR and the EU AI Act.
 
Additionally, organizations must address concerns around data quality, governance, and security to build AI models that are not only innovative but also trustworthy. This panel will explore strategies for integrating AI across the enterprise, fostering cross-functional collaboration, and overcoming technical and cultural barriers to unlock the full potential of AI-driven transformation.
 
Key Takeaways:
  • Enterprises must overcome siloed data, legacy infrastructure, and organizational inertia to scale AI successfully. This requires fostering collaboration between data scientists, business leaders, and IT teams to ensure AI solutions align with real business needs and deliver measurable outcomes.
  • Transparency, fairness, and regulatory adherence must be central to AI development. Organizations need to implement clear data lineage, bias mitigation strategies, and governance frameworks to ensure compliance with evolving data protection laws while maintaining trust with customers and stakeholders.
  •  AI success hinges on integrating it into enterprise-wide decision-making rather than treating it as a siloed initiative. Companies that embed AI into their strategic frameworks can enhance efficiency, drive innovation, and gain a competitive edge by transforming AI from an experimental tool into a scalable driver of business growth.

Arron Hand

Chief AI Officer, ArcelorMittal

Jason Smith

CDO & AI Strategy Lead, Publicis Media

Emma Verghagen

Global Technology Portfolio & Demand Director

14:30 - 15:00 CET

The State of AI in 2025: Security, Compliance, and Challenges

AI-driven social engineering attacks are now far more advanced, with phishing and deepfake techniques so convincing that traditional defenses are no longer enough. To stay ahead of these threats, businesses have rapidly adopted next-gen identity management solutions and AI-powered fraud detection tools.
 
On the regulatory front, the EU AI Act is fully in effect, with companies worldwide racing to meet its stringent requirements for transparency, ethical AI use, and data protection. As the global regulatory environment tightens, organizations are also faced with the growing importance of securing third-party identities and strengthening B2B connections. Meanwhile, the rise of quantum computing is forcing businesses to quickly transition to quantum-resistant encryption methods to secure sensitive data and stay compliant with new standards.
 
Key Takeaways:
  • AI-Driven Cybersecurity Threats: As AI-powered social engineering has reached new heights, companies are prioritizing advanced identity verification systems and AI-driven fraud detection to defend against increasingly sophisticated attacks.
  • Regulatory Compliance is Now a Must: With the EU AI Act and other regulations in full effect, businesses have had to adapt quickly to ensure compliance with ethical AI practices, data privacy, and transparency.
  • Quantum Computing Demands Crypto-Agility: As quantum computing reshapes encryption standards, businesses have moved swiftly to adopt quantum-resistant cryptography to safeguard their data and maintain regulatory compliance.

Thom Schiltmans

Head of Governance, Risk & Compliance, Signify

15:00 - 15:30 CET

Unlocking AI's Potential in Cybersecurity and Embracing Its Complexities

From data breaches that expose sensitive customer information to ransomware attacks that can paralyze entire industries, the stakes have never been higher. In this rapidly advancing digital world, AI is becoming a powerful ally in the fight against cybercrime.
 
This discussion will explore how AI is transforming cybersecurity by enabling faster detection, deeper analysis, and more efficient responses to attacks. For example, AI systems can now identify and stop APTs before they infiltrate a network, spotting patterns that human analysts might miss. Similarly, AI can predict and prevent ransomware attacks by monitoring suspicious file behavior and blocking malicious encryption processes in real-time. However, as AI becomes more central to cybersecurity, concerns about its cost, implementation complexity, and ethical risks continue to arise.
 
Experts will discuss how businesses can harness AI while navigating the challenges of a rapidly shifting threat environment and an often-overburdened cybersecurity workforce. With AI’s potential to autonomously defend against complex threats like phishing and zero-day vulnerabilities, the future of cybersecurity may see a major shift, with AI systems functioning as self-sustaining guardians against attacks without human intervention.
 
Key Takeaways:
  • AI is revolutionizing cybersecurity by automating threat detection and response, dramatically increasing efficiency and reducing reaction times.
  • AI enables proactive defense against advanced threats like APTs, ransomware, and zero-day attacks, blocking them before they can cause significant damage.
  • Integrating AI into cybersecurity comes with significant challenges, including high costs, ethical considerations, and the need for specialized expertise.
  •  As AI capabilities grow, the potential for fully autonomous defense systems capable of neutralizing cyber threats without human input becomes more likely.
  • Organizations must carefully implement AI into their cybersecurity infrastructure, ensuring effective deployment while addressing resource constraints and ethical concerns.

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

15:30 - 16:00 CET

Cyber Resiliency and Ethical AI for a Secure and Responsible Future

Traditional security measures are no longer sufficient to protect sensitive data or ensure continuous operations. This is where cyber resiliency comes in—it not only defends against cyberattacks but ensures systems can quickly recover and adapt in real-time. However, as AI technology becomes integral to cybersecurity, it’s crucial that it operates within an ethical framework. Ethical AI is essential to ensure fairness, transparency, and accountability in AI-driven security tools. From preventing biases in threat detection to safeguarding user privacy, integrating ethical principles into AI models can ensure that organizations build resilient systems that are both secure and responsible.
 
This panel will explore how organizations can blend ethical guidelines with cyber resiliency to create innovative yet trustworthy cybersecurity solutions.
 
The future of cybersecurity lies in resilient systems that are both adaptable and ethically sound. By integrating Ethical AI into cyber resilience strategies, organizations can create security solutions that are not only effective but also fair, transparent, and trustworthy. This approach will enable organizations to stay secure in an increasingly complex and regulated digital world while fostering public confidence in their AI-driven cybersecurity measures.
 
Key Takeaways:
  • Cyber resilience is about not just defending against attacks but ensuring systems can quickly recover and adapt. By embedding Ethical AI into security frameworks, organizations can create smarter, more transparent systems that detect threats and respond effectively. This ensures trust in AI-driven solutions while improving long-term resilience.
  • AI models in cybersecurity must be free from bias to ensure fair and accurate threat detection. By adopting ethical AI principles, organizations can create inclusive security systems that work across diverse environments and scenarios. Addressing bias in AI models is key to strengthening the overall security posture and protecting against vulnerabilities.
  • Ethical AI doesn’t just improve technology—it helps organizations comply with data privacy laws and global cybersecurity regulations. By aligning AI-driven security tools with these standards, organizations can ensure responsible innovation while maintaining credibility and trust with users. This alignment is crucial for staying ahead of evolving cyber threats and regulatory changes.

Sarah Matthews

Group Responsible AI Manager, The Adecco Group

Eduardo Luis Arana

IT MSE Product Manager - Customer AI, Nestle

Seth Frimpong-Manso

CISO, Access Bank (Ghana) Plc

JP Morgan

Chief Excecutive Officer

16:00 - 16:30 CET

Cybersecurity Showdown: AI vs. Humans - Who's Really in Control?

AI-powered security tools are already detecting and mitigating cyberattacks faster than traditional methods, leveraging real-time behavioural analysis and anomaly detection.
 
However, AI isn’t infallible—adversarial attacks, data poisoning, and deepfake-driven social engineering are exposing its vulnerabilities. Meanwhile, human expertise remains indispensable for strategic decision-making, ethical oversight, and adapting to novel attack tactics that AI may not yet recognize. With cybercriminals also weaponizing AI for automated phishing, ransomware evolution, and AI-powered deception, the future of cybersecurity depends on how well humans and AI can work together.
 
This panel will dissect the critical strengths and flaws of AI, explore the limits of human intuition in a data-driven battlefield, and debate whether the next generation of cyber defense will be a partnership—or a showdown—between man and machine.
 
Key Takeaways:
  • AI: A Cybersecurity Powerhouse or Just a Tool? Unpack how AI automates threat detection, responds at machine speed, and lightens human workloads—while still requiring expert oversight to prevent blind spots and errors.
  • Where AI Fails, Humans Prevail. Explore AI’s weaknesses, from adversarial attacks that manipulate machine learning models to the ethical concerns of letting AI make security decisions without human judgment.
  • Man + Machine: The Future of Cyber Defense. Debate the best strategies for blending AI automation with human expertise, closing security gaps, and preparing for AI-driven cyber warfare.
 

Alexander Ermakovich

Head of Account Security, Cybersecurity, Booking.com

Jose Soares

Director of IT, The Capital Hotels, Apartments & Resorts

Stuart Frost

Head of Enterprise Security & Risk Management, UK Government

JP Morgan

Chief Excecutive Officer

10:00 - 10:30 SGT

AI Under Control: How CISOs Can Govern, Oversee, and Secure AI-Powered Cybersecurity

While AI-driven systems can significantly enhance threat detection, automate responses, and analyze vast amounts of data faster than ever before, they also present a host of new challenges for CISOs. As cybercriminals increasingly weaponize AI for sophisticated attacks—from automated phishing campaigns to deepfake fraud—the risk to organizations’ security is rising. Additionally, algorithmic bias and adversarial attacks targeting AI models can introduce significant vulnerabilities, undermining the fairness and effectiveness of automated decisions. This makes AI governance, transparency, and human oversight critical to maintaining security and trust in AI systems. In this keynote, we’ll discuss how CISOs can ensure AI systems are secure, ethical, and aligned with regulatory requirements. With AI now central to business and security operations, this session will explore strategies to navigate the challenges of 2025 and beyond while ensuring AI is deployed safely and responsibly.
 
As AI becomes increasingly central to cybersecurity, the ability to govern, oversee, and secure AI systems will be crucial for CISOs to ensure their organizations stay ahead of potential risks. This session will provide the insights and tools needed to navigate the complex challenges of managing AI in cybersecurity in 2025 and beyond.
 
Key Takeaways:
 
  • CISOs must manage bias, preserve auditability, and react to changing regulations—especially in sensitive industries—to limit risks and safeguard reputation as AI transforms cybersecurity.
  • From adversarial attacks to the potential for bias in AI systems, CISOs need to adopt strategies to handle the unique risks posed by AI. A balance of AI’s capabilities and human oversight is key to ensuring secure, fair, and reliable decision-making.
  • Given AI’s impact on sectors like healthcare, finance, and public safety, CISOs must ensure these systems are explainable and auditable. Prioritizing transparency helps build trust with regulators, customers, and internal teams.

Sekhar Nagasundaram

Global Head of Cybersecurity Threat & Cyberdefense, Elevance Health

Hemant Baidwan

CISO, U.S. Department of Homeland Security

10:30 - 11:00 SGT

Defensive AI vs. Offensive AI: Fighting Fire With Fire

But can defensive AI truly outsmart offensive AI, or are we entering an arms race with unpredictable consequences? This session explores the evolving landscape of AI-powered cybersecurity, weighing the opportunities and risks of using machine intelligence to detect, defend and respond in real time.
 
The session will cover:
  • Examining how offensive AI is transforming the threat landscape through automation, obfuscation and scale.
  • Exploring how defensive AI can be deployed to accelerate detection, reduce response time and anticipate attack patterns.
  • Discussing the strategic, ethical and operational implications of an AI vs. AI security paradigm – and its impact on enterprise defense planning.

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

11:00 - 12:00 SGT

Convergence of AI and Cybersecurity: The Way Forward for Enterprise Security From a Policy Perspective

But the convergence of these technologies raises critical policy questions around governance, accountability and cross-border risks. This session will explore how APAC governments and regulators can design forward-looking frameworks that support AI innovation in security while ensuring responsible use, data protection and regional interoperability.

The session will cover:

  • Understanding the unique challenges and opportunities of AI-driven cybersecurity in APAC’s diverse regulatory landscape.
  • Exploring policy approaches that promote secure AI adoption while addressing risks such as model exploitation, data misuse and algorithmic opacity.
  • How public-private collaboration can shape resilient, future-ready enterprise security frameworks across the region.

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

12:00 - 12:30 sgt

How Agentic AI is Reshaping Cybersecurity and Incident Response

Enterprises are leveraging agentic AI for automated threat hunting, behavioral anomaly detection and incident containment, significantly reducing response time and minimizing damage from cyberattacks. But the rise of agentic AI also introduces challenges, such as ensuring ethical decision-making, preventing adversarial exploitation and maintaining human oversight in critical security operations.

The session will cover:

  • Leveraging agentic AI for deception technology and threat simulation;
  • Understanding the risks of AI bias and the adversarial manipulation of AI-driven security models;
  • Balancing human intuition with AI-driven automation for better decision-making.

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

13:30 - 14:30 sgt

How Does AI Continue to Change Cybersecurity: Insights From CISOs

It is critical to understand how AI-driven security measures – build with algorithmic precision and human oversight – are evolving to assess and mitigate risks.

CISOs must develop effective processes to integrate AI into cybersecurity operations and manage AI sprawl to ensure governance frameworks meet stringent AI security and privacy regulations.

The session will cover:

  • Unique security risks introduced by AI-powered applications.
  • Making AI ubiquitous for cyber resiliency.
  • Redefining cybersecurity with the use of AI.

 

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

14:30 - 15:00 sgt

Use of AI in Digital Banking: What's at Stake for CISOs?

But for CISOs, it also introduces new cybersecurity and compliance challenges. AI-driven solutions – from predictive fraud analytics to biometric authentication – require robust security frameworks to prevent data breaches, model manipulation and adversarial attacks.

The rise of deepfakes and synthetic identity attacks also demand continuous monitoring and advanced threat intelligence. CISOs must establish robust AI governance, adversarial AI defenses and zero trust frameworks to ensure secure AI adoption in banking.

The session will cover:

  • Regulatory trends shaping AI adoption in financial services.
  • Best practices for securing AI-driven banking.
  • Ensuring accuracy and fairness in AI-based financial decision-making.

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

15:00 - 15:30 sgt

The Rise of Adversarial AI as a Service: A CXO Debate

A new threat is emerging: adversarial AI as a service, allowing cybercriminals to rent or buy AI-powered attack tools with minimal technical expertise. This session will feature a live debate on the risks, implications and ethical questions posed by the rise of commoditized offensive AI. How should enterprises, regulators and security leaders respond? Should AI tools be restricted at the source – or will open innovation always outpace regulation?

The session will cover:

  • Understanding how AI as a service is lowering the barrier for sophisticated attacks such as deepfake phishing, automated recon and evasion.
  • Evaluating the ethical and regulatory challenges of limiting offensive AI capabilities while supporting open innovation.
  • Exploring proactive defense strategies to detect, disrupt, and deter AI-enabled threats. 

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

15:30 - 16:00 sgt

Should APAC Governments Lead Their Own AI Regulations or Follow Global Frameworks for AI Regulation?

India’s DPDP Act, Singapore’s AI Verify and Japan’s softer self-regulation present different regulatory philosophies. Opponents argue that aligning with standards such as NIST, ISO or EU AI Act ensures global interoperability and trust. Striking the right balance is critical – not only for innovation and economic competitiveness but also for ensuring trust, interoperability and ethical deployment.

The session will cover:

  • Understanding the risks and benefits of leading versus aligning with global AI regulations from a business and policy perspective.
  • Exploring how regulatory fragmentation or harmonization may affect enterprise AI strategy, data governance and compliance planning.
  • Gaining insights into how regional regulatory decisions may shape APAC’s global position in AI innovation and adoption.

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

16:00 - 16:30 sgt

Optimizing IT With AI: Preparing for the Post-Quantum World

The convergence of AI-driven optimization and post-quantum readiness presents both opportunities and challenges. Forward-thinking CIOs and CISOs must create IT environments that are not only agile and efficient today but also resilient against future quantum threats.

This session will explore how AI can streamline infrastructure management, enhance threat detection and improve decision-making, while laying the foundation for cryptographic agility and quantum-safe architectures.

The session will cover:

  • Using AI to modernize IT operations, automate decision-making and improve agility across complex environments.
  • Building quantum resilience now by identifying vulnerable cryptographic assets and evaluating post-quantum algorithms.
  • Aligning IT, security and compliance strategies to ensure long-term readiness for a quantum-powered threat landscape.

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

JP Morgan

Chief Excecutive Officer

Closing Comments

Sponsors

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Registration

The Summit Experience

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Serverless: Accelerating Development for Data-Intensive Workloads

Future Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

Katie Jenkins

EVP & CISO , Liberty Mutual Insurance

Threat Intelligence and the Dark Web

In this session, a banking security leader and an FBI agent detail:

  • What the dark web is – and is not;
  • How to gain useful and complete information and apply it;
  • The pros and cons of going solo vs. hiring a service.