Highlight Topics
- Leveraging AI for Defense
- Balancing Privacy and Compliance
- Secure AI Integration
- Combating Threats With AI
- Diverse Industry AI Applications
The Virtual AI Summit by ISMG delves into a dynamic exploration of the intersection between AI and cybersecurity. Take a deep dive into ethical considerations, LLM security, and the intricate impacts on privacy and intellectual property. Engage directly with industry leaders to uncover the synergy between human intelligence and AI in fortifying cybersecurity, with a special focus on AI-driven threat detection and risk management strategies. This summit equips security professionals with vital AI insights, promoting transparent governance and hands-on application through sessions dedicated to real-world cybersecurity challenges. Expect a day packed with strategic dialogues, invaluable insights, and collaborative exploration at the forefront of AI and cybersecurity.
View our ISMG Event Experience video to see what your peers are saying about their participation.
View our ISMG Event Experience video to see what your peers are saying about their participation.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.
Costello will share insight from CISA’s strategic action plan, which focuses on responsible AI use, securing AI systems and mitigating AI-related threats to critical infrastructure. Additionally, the discussion will highlight the evolving cyber risks and how AI can be leveraged to enhance national security. Attendees will also learn how their organizations can utilize AI to enhance their cybersecurity posture, with insights into CISA’s available resources and collaborative opportunities. This is a unique opportunity for information security practitioners in government to gain valuable insights from one of the leading voices in the field.
Key takeaways:
Robert Costello, Chief Information Officer, CISA
Join this session to hear from the speaker why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.
Shaked Rotlevi, Technical Product Marketing Manager, Wiz
Tim Gallo, Head of Global Solutions Architects, Google
Jaimen Hoopes, Vice President of Product Management, Data Security
Solutions
Ronan Murphy, Member of the AI Advisory Council, Government of Ireland
In this session, we will cover:
Liquian Lim, Senior Product Marketing Manager, Snyk
Imran Ahmad, Partner/Canadian Head of Technology, Norton Rose
Fulbright
Ray Griffin, CISO and Head of Information Security, Cox Media Group
John Horn, Director, Cybersecurity Practice, Datos Insights
Shervin Evans, Information Security Officer, Deltec Bank & Trust Limited
Couple this with the complexity of navigating your own unique data estate and infrastructure and the constantly evolving nature of attacks. Making mistakes can cost millions along with irreparable brand damage. And if we are talking about critical infrastructure impacted by cyberattacks, such as healthcare and public utilities, human lives could be at stake.
The speaker will discuss how IT and security teams, at all levels of cyber expertise, can leverage AI to accelerate cyber investigation and recovery.
Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik
This session, tailored for experienced cybersecurity practitioners, will delve into the critical legal issues surrounding gen AI. The session will provide an overview of the latest gen AI technologies and their implications. It will explore intellectual property law issues, including potential legal risks, IP litigation, indemnification, and practical legal recommendations. Additionally, it will address privacy and cybersecurity law, emphasizing the importance of these principles and the unique risks posed by gen AI. Attendees will gain insights into the U.S. regulatory landscape and the EU AI Act, essential legal considerations for maintaining privacy and cybersecurity, and best practices for AI governance. This comprehensive session aims to equip cybersecurity practitioners with the knowledge and strategies needed to navigate the evolving legal landscape of gen AI effectively.
Key takeaways:
Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity
Practice, Hunton Andrews Kurth LLP
Tyler Maddry, Partner, Hunton Andrews Kurth LLP
Track A
Peeyush Patel, CISO, XPO
Jeremy Daily, Associate Professor, Colorado State University
Track B
Heather West, Senior Director, Cybersecurity and Privacy Services, Venable
David Anderson, Vice President, Cyber, Woodruff Sawyer
Anahi Santiago, CISO, ChristianaCare
Alex Vitruk, Senior Associate Attorney, BakerHostetler
John Banghart, Senior Director for Cybersecurity Services, Venable LLP
David Anderson, Vice President, Cyber, Woodruff Sawyer
Anahi Santiago, CISO, ChristianaCare
As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy.
This session will address the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session will serve as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations.
Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, the discussion aims to shape a responsible and privacy-conscious approach to AI deployment.
Key discussion points:
Ginger Armbruster, Chief Privacy Officer and IT Division Director
Karen Habercoss, Chief Privacy Officer, UChicago Medicine
Bill Foster, U.S. Representative, Illinois 11th Congressional District
Track A
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
Track B
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
Track A
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
Track B
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
Track A
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
Track B
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
Track A
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
Track B
They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:
#ISMGSummit
@ISMG_News
ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
Future Events
In this session, a banking security leader and an FBI agent detail: