August 19-20, 2025

AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities

10:00 - 15:30 | Virtual Event

On Demand August 20, 2025

Event Overview

The Virtual AI Summit by ISMG delves into a dynamic exploration of the intersection between AI and cybersecurity. Take a deep dive into ethical considerations, LLM security, and the intricate impacts on privacy and intellectual property. Engage directly with industry leaders to uncover the synergy between human intelligence and AI in fortifying cybersecurity, with a special focus on AI-driven threat detection and risk management strategies. This summit equips security professionals with vital AI insights, promoting transparent governance and hands-on application through sessions dedicated to real-world cybersecurity challenges. Expect a day packed with strategic dialogues, invaluable insights, and collaborative exploration at the forefront of AI and cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

  • Leveraging AI for Defense
  • Balancing Privacy and Compliance
  • Secure AI Integration
  • Combating Threats With AI
  • Diverse Industry AI Applications

Robert Costello

Chief Information Officer, CISA

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Ginger Armbruster

Chief Privacy Officer and IT Division Director, City of Seattle, WA

Tyler Maddry

Partner, Hunton Andrews Kurth LLP

Lisa Sotto

Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP

Kenneth Townsend

CISO, Ingredion

E.P. Mathew

Deputy CIO, Defense Intelligence Agency

Imran Ahmad

Partner/Canadian Head of Technology, Norton Rose Fulbright

John Horn

Director, Cybersecurity Practice, Datos Insights

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

Anahi Santiago

CISO, ChristianaCare

Ray Griffin

CISO and Head of Information Security, Cox Media Group

Past Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda

Given the ever-evolving nature of cybersecurity, the agenda will be continually updated to feature the most timely and relevant sessions.

Opening Remarks

Virtual AI Summit, 2025

AI Under Control: How CISOs Can Govern, Oversee, and Secure AI-Powered Cybersecurity

While AI-driven systems can significantly enhance threat detection, automate responses, and analyze vast amounts of data faster than ever before, they also present a host of new challenges for CISOs. As cybercriminals increasingly weaponize AI for sophisticated attacks—from automated phishing campaigns to deepfake fraud—the risk to organizations’ security is rising. Additionally, algorithmic bias and adversarial attacks targeting AI models can introduce significant vulnerabilities, undermining the fairness and effectiveness of automated decisions. This makes AI governance, transparency, and human oversight critical to maintaining security and trust in AI systems.
 
In this keynote, we’ll discuss how CISOs can ensure AI systems are secure, ethical, and aligned with regulatory requirements. With AI now central to business and security operations, this session will explore strategies to navigate the challenges of 2025 and beyond while ensuring AI is deployed safely and responsibly.
 
 
As AI becomes increasingly central to cybersecurity, the ability to govern, oversee, and secure AI systems will be crucial for CISOs to ensure their organizations stay ahead of potential risks. This session will provide the insights and tools needed to navigate the complex challenges of managing AI in cybersecurity in 2025 and beyond.
 
Key Takeaways:
 
  • CISOs must manage bias, preserve auditability, and react to changing regulations—especially in sensitive industries—to limit risks and safeguard reputation as AI transforms cybersecurity.
  • From adversarial attacks to the potential for bias in AI systems, CISOs need to adopt strategies to handle the unique risks posed by AI. A balance of AI’s capabilities and human oversight is key to ensuring secure, fair, and reliable decision-making.
  • Given AI’s impact on sectors like healthcare, finance, and public safety, CISOs must ensure these systems are explainable and auditable. Prioritizing transparency helps build trust with regulators, customers, and internal teams.

Robert Costello, Chief Information Officer, CISA

Virtual AI Summit, 2025

How Generative AI is Reinventing Cybersecurity Across Europe

From ransomware attacks to data theft, enterprises face a constant battle against cybercriminals. The solution? Generative AI. This groundbreaking technology is transforming how businesses protect themselves, providing faster, smarter defenses against the ever-growing volume of cyberattacks.
 
Join us for a high-impact panel discussion where AI experts and industry leaders showcase how Generative AI is reshaping cybersecurity for enterprises across Europe. Learn how businesses in sectors like finance, healthcare, and manufacturing are using AI to detect and neutralize threats—from spear phishing to malware attacks—before they cause major damage.
 
Generative AI is no longer a luxury; it’s a must-have for European enterprises looking to stay ahead of the rapidly changing cyber threat landscape. In the battle against cybercrime, AI is the ultimate weapon for businesses to stay secure and proactive in an ever-evolving digital world.
 
Key Takeaways:
  • Discover how European enterprises are integrating Generative AI into their security strategies to enhance real-time threat detection and response. AI is becoming a critical tool to spot anomalies, predict attacks, and stop them before they escalate.
  • Dive into case studies where AI has successfully mitigated cyber risks. From protecting sensitive customer data in France’s banking sector to securing cloud-based systems in Germany, AI is proving invaluable in defending against the latest cyberattack techniques.
  • Understand how Generative AI enables enterprises to scale their security measures as they grow, adapting seamlessly to an ever-evolving digital landscape. Whether it’s across multiple locations or a range of complex systems, AI is the key to agile, robust defense.
  • Get ahead of the curve with insights into AI’s next frontier in cybersecurity. From automated incident response to AI-powered threat intelligence, these innovations are transforming how enterprises prepare for and recover from cyberattacks.
 

Robert Costello, Chief Information Officer, CISA

Virtual AI Summit, 2025

An In Depth Look at AI & the Evolving Cyber Threat Landscape

Key discussion points:
  •  Current Threat Landscape: Identifying the most significant attacks and attackers impacting organizations today. Understand the prevalent and dangerous cyber threats that enterprises face.
  • Evolving Attack Surface: Assessing how the attack surface has changed over the past year and the implications for security strategies. Explore how digital transformation and remote work have expanded vulnerabilities.
  • AI in Cybersecurity: Exploring the dual role of AI in both facilitating cyber attacks and bolstering cybersecurity defenses. Discuss how AI is used by adversaries and defenders alike.
  • Defensive Adaptations: Reviewing the advancements and shortcomings in security defenses over the past year. Highlight effective measures, existing gaps, and innovative solutions.

Tim Gallo, Head of Global Solutions Architects, Google

 

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Ensuring AI Integrity in EMEA: Addressing Data Governance, Compliance, and Trust in AI

Businesses must manage complicated regulatory environments while preserving AI-driven efficiency and competitive advantage in light of the EU AI Act, GDPR, and other regional regulations that tighten oversight. However, the integrity of AI is fundamentally tied to the quality and governance of the data that powers it. From mitigating biases in AI-driven decisions to preventing security threats such as adversarial attacks and model manipulation, data leaders must proactively embed governance, transparency, and ethical AI principles into their strategies.
 
This panel will explore how organisations can build AI systems that foster trust, meet compliance requirements, and drive sustainable business value in an era where AI integrity is no longer optional but a boardroom imperative.
 
Key Takeaways:
  • AI Governance as a Competitive Advantage: Organisations that embed AI governance into their broader data strategy will not only ensure regulatory compliance but also gain a strategic edge by enhancing brand trust, reducing operational risks, and fostering responsible AI adoption. Strong governance frameworks enable businesses to scale AI with confidence, aligning innovation with accountability.
  • Mitigating Bias and Ensuring Fair AI: AI models inherit biases from historical data, leading to potential risks in hiring, lending, and customer engagement. By implementing proactive data governance measures such as bias audits, diverse and representative training datasets, and human-in-the-loop oversight, organisations can prevent AI-driven discrimination, safeguard brand reputation, and strengthen ethical AI adoption.
  • Balancing AI Innovation with Security & Compliance: As AI security threats grow, including adversarial attacks, model poisoning, and data manipulation, businesses must extend cybersecurity principles to AI systems. Integrating AI security into broader data protection strategies, deploying automated compliance monitoring, and enforcing stringent access controls will be crucial to mitigating risks while staying ahead of regulatory changes in the EMEA region.
 

Jaimen Hoopes, Vice President of Product Management, Data Security

Solutions

 

Ronan Murphy, Member of the AI Advisory Council, Government of Ireland

Virtual AI Summit, 2025

Scaling AI Successfully: Overcoming Technical and Cultural Barriers for Enterprise Growth

Challenges such as outdated IT architectures, fragmented data ecosystems, regulatory complexities, and organizational resistance often prevent AI initiatives from scaling beyond isolated pilot projects. To drive meaningful business impact, AI must be embedded into core operational and strategic frameworks rather than confined to experimental use cases. This requires a holistic approach that aligns people, processes, and platforms while ensuring AI systems remain ethical, transparent, and compliant with evolving global regulations like GDPR and the EU AI Act.
 
Additionally, organizations must address concerns around data quality, governance, and security to build AI models that are not only innovative but also trustworthy. This panel will explore strategies for integrating AI across the enterprise, fostering cross-functional collaboration, and overcoming technical and cultural barriers to unlock the full potential of AI-driven transformation.
 
Key Takeaways:
  • Enterprises must overcome siloed data, legacy infrastructure, and organizational inertia to scale AI successfully. This requires fostering collaboration between data scientists, business leaders, and IT teams to ensure AI solutions align with real business needs and deliver measurable outcomes.
  • Transparency, fairness, and regulatory adherence must be central to AI development. Organizations need to implement clear data lineage, bias mitigation strategies, and governance frameworks to ensure compliance with evolving data protection laws while maintaining trust with customers and stakeholders.
  •  AI success hinges on integrating it into enterprise-wide decision-making rather than treating it as a siloed initiative. Companies that embed AI into their strategic frameworks can enhance efficiency, drive innovation, and gain a competitive edge by transforming AI from an experimental tool into a scalable driver of business growth.
 

Liquian Lim, Senior Product Marketing Manager, Snyk

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Virtual AI Summit, 2025

The State of AI in 2025: Security, Compliance, and Challenges

AI-driven social engineering attacks are now far more advanced, with phishing and deepfake techniques so convincing that traditional defenses are no longer enough. To stay ahead of these threats, businesses have rapidly adopted next-gen identity management solutions and AI-powered fraud detection tools.
 
On the regulatory front, the EU AI Act is fully in effect, with companies worldwide racing to meet its stringent requirements for transparency, ethical AI use, and data protection. As the global regulatory environment tightens, organizations are also faced with the growing importance of securing third-party identities and strengthening B2B connections. Meanwhile, the rise of quantum computing is forcing businesses to quickly transition to quantum-resistant encryption methods to secure sensitive data and stay compliant with new standards.
 
Key Takeaways:
  • AI-Driven Cybersecurity Threats: As AI-powered social engineering has reached new heights, companies are prioritizing advanced identity verification systems and AI-driven fraud detection to defend against increasingly sophisticated attacks.
  • Regulatory Compliance is Now a Must: With the EU AI Act and other regulations in full effect, businesses have had to adapt quickly to ensure compliance with ethical AI practices, data privacy, and transparency.
  • Quantum Computing Demands Crypto-Agility: As quantum computing reshapes encryption standards, businesses have moved swiftly to adopt quantum-resistant cryptography to safeguard their data and maintain regulatory compliance.
 

Imran Ahmad, Partner/Canadian Head of Technology, Norton Rose

Fulbright

 

Ray Griffin, CISO and Head of Information Security, Cox Media Group

 

John Horn, Director, Cybersecurity Practice, Datos Insights

 

Shervin Evans, Information Security Officer, Deltec Bank & Trust Limited

Virtual AI Summit, 2025

Unlocking AI's Potential in Cybersecurity and Embracing Its Complexities

As cyber-attacks grow in volume and sophistication, traditional defense mechanisms—such as firewalls and antivirus software—are struggling to keep up. From data breaches that expose sensitive customer information to ransomware attacks that can paralyze entire industries, the stakes have never been higher. In this rapidly advancing digital world, AI is becoming a powerful ally in the fight against cybercrime.
 
This discussion will explore how AI is transforming cybersecurity by enabling faster detection, deeper analysis, and more efficient responses to attacks. For example, AI systems can now identify and stop APTs before they infiltrate a network, spotting patterns that human analysts might miss. Similarly, AI can predict and prevent ransomware attacks by monitoring suspicious file behavior and blocking malicious encryption processes in real-time. However, as AI becomes more central to cybersecurity, concerns about its cost, implementation complexity, and ethical risks continue to arise.
 
Experts will discuss how businesses can harness AI while navigating the challenges of a rapidly shifting threat environment and an often-overburdened cybersecurity workforce. With AI’s potential to autonomously defend against complex threats like phishing and zero-day vulnerabilities, the future of cybersecurity may see a major shift, with AI systems functioning as self-sustaining guardians against attacks without human intervention.
 
Key Takeaways:
  • AI is revolutionizing cybersecurity by automating threat detection and response, dramatically increasing efficiency and reducing reaction times.
  • AI enables proactive defense against advanced threats like APTs, ransomware, and zero-day attacks, blocking them before they can cause significant damage.
  • Integrating AI into cybersecurity comes with significant challenges, including high costs, ethical considerations, and the need for specialized expertise.
  •  As AI capabilities grow, the potential for fully autonomous defense systems capable of neutralizing cyber threats without human input becomes more likely.
  • Organizations must carefully implement AI into their cybersecurity infrastructure, ensuring effective deployment while addressing resource constraints and ethical concerns.
 

Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Cyber Resiliency and Ethical AI for a SEcure and Responsible Future

Traditional security measures are no longer sufficient to protect sensitive data or ensure continuous operations. This is where cyber resiliency comes in—it not only defends against cyberattacks but ensures systems can quickly recover and adapt in real-time. However, as AI technology becomes integral to cybersecurity, it’s crucial that it operates within an ethical framework. Ethical AI is essential to ensure fairness, transparency, and accountability in AI-driven security tools. From preventing biases in threat detection to safeguarding user privacy, integrating ethical principles into AI models can ensure that organizations build resilient systems that are both secure and responsible.
 
This panel will explore how organizations can blend ethical guidelines with cyber resiliency to create innovative yet trustworthy cybersecurity solutions.
 
The future of cybersecurity lies in resilient systems that are both adaptable and ethically sound. By integrating Ethical AI into cyber resilience strategies, organizations can create security solutions that are not only effective but also fair, transparent, and trustworthy. This approach will enable organizations to stay secure in an increasingly complex and regulated digital world while fostering public confidence in their AI-driven cybersecurity measures.
 
Key Takeaways:
  • Cyber resilience is about not just defending against attacks but ensuring systems can quickly recover and adapt. By embedding Ethical AI into security frameworks, organizations can create smarter, more transparent systems that detect threats and respond effectively. This ensures trust in AI-driven solutions while improving long-term resilience.
  • AI models in cybersecurity must be free from bias to ensure fair and accurate threat detection. By adopting ethical AI principles, organizations can create inclusive security systems that work across diverse environments and scenarios. Addressing bias in AI models is key to strengthening the overall security posture and protecting against vulnerabilities.
  • Ethical AI doesn’t just improve technology—it helps organizations comply with data privacy laws and global cybersecurity regulations. By aligning AI-driven security tools with these standards, organizations can ensure responsible innovation while maintaining credibility and trust with users. This alignment is crucial for staying ahead of evolving cyber threats and regulatory changes.
 

Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity

Practice, Hunton Andrews Kurth LLP

 

Tyler Maddry, Partner, Hunton Andrews Kurth LLP

Track A

Securing the Road: Why Vulnerabilities in Electric Logging Devices are Everyone's Problem

Peeyush Patel

CISO, XPO

Jeremy Daily

Associate Professor, Colorado State University
This session, tailored for CISOs and cybersecurity leaders across various industries, will provide crucial insights into these vulnerabilities. While the primary focus is on transportation, the speakers’ insights into IoT vulnerabilities, wireless network security, and firmware integrity will be applicable to many sectors, including manufacturing, healthcare, finance, and critical infrastructure. Learn how ELDs, mandated to track driving hours and log critical vehicle data, can be exploited via Bluetooth or Wi-Fi connections, leading to unauthorized control, data manipulation, and malware propagation. These insights are not just crucial for the transportation sector but resonate across all industries reliant on interconnected and IoT systems.
 
The final vulnerability, and perhaps the most concerning, is the potential for a self-propagating truck-to-truck worm, which takes advantage of the inherent networked nature of these devices. Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications.
 
Key takeaways:
 
  • Understanding the parallels between ELD vulnerabilities and broader IoT security challenges affecting various industries;
  • Practical measures to safeguard interconnected systems and prevent widespread operational disruptions;
  • The importance of cross-industry collaboration in tackling emerging cybersecurity threats.
 

Peeyush Patel, CISO, XPO

 

Jeremy Daily, Associate Professor, Colorado State University

Track B

AI in Healthcare: Addressing Bias and Security Risks

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

David Anderson

Vice President, Cyber, Woodruff Sawyer

Anahi Santiago

CISO, ChristianaCare

Alex Vitruk

Senior Associate Attorney, BakerHostetler
However, as AI algorithms increasingly influence medical decision-making, concerns about bias and discrimination have become more apparent. These biases can arise from inherent issues in AI datasets, algorithmic design, and implementation, potentially perpetuating disparities in healthcare delivery and outcomes. This session will delve into the ethical, legal, and security implications of healthcare discrimination facilitated by AI, including the erosion of trust, patient harm, and legal challenges. We will explore how AI’s blind spots can inadvertently reinforce existing biases and how representative datasets can help mitigate these challenges.
 
Join us to examine the following key areas:
 
  • Biases in AI datasets: Understand how biases in training data can lead to unequal healthcare outcomes and discuss the importance of using diverse and representative datasets.
  • Algorithmic design, implementation and security: Analyze how design choices and system vulnerabilities can influence the fairness and safety of AI applications.
  • Mitigation and protection strategies: Discuss effective strategies to mitigate bias in AI healthcare applications, emphasizing the need for ongoing oversight, ethical standards, and robust security measures to ensure equitable and ethical use of AI in healthcare.
 

Heather West, Senior Director, Cybersecurity and Privacy Services, Venable

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

Alex Vitruk, Senior Associate Attorney, BakerHostetler

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Cybersecurity Showdown: AI vs. Humans - Who's Really in Control?

AI-powered security tools are already detecting and mitigating cyberattacks faster than traditional methods, leveraging real-time behavioural analysis and anomaly detection.
 
However, AI isn’t infallible—adversarial attacks, data poisoning, and deepfake-driven social engineering are exposing its vulnerabilities. Meanwhile, human expertise remains indispensable for strategic decision-making, ethical oversight, and adapting to novel attack tactics that AI may not yet recognize. With cybercriminals also weaponizing AI for automated phishing, ransomware evolution, and AI-powered deception, the future of cybersecurity depends on how well humans and AI can work together.
 
This panel will dissect the critical strengths and flaws of AI, explore the limits of human intuition in a data-driven battlefield, and debate whether the next generation of cyber defense will be a partnership—or a showdown—between man and machine.
 
Key Takeaways:
  • AI: A Cybersecurity Powerhouse or Just a Tool? Unpack how AI automates threat detection, responds at machine speed, and lightens human workloads—while still requiring expert oversight to prevent blind spots and errors.
  • Where AI Fails, Humans Prevail. Explore AI’s weaknesses, from adversarial attacks that manipulate machine learning models to the ethical concerns of letting AI make security decisions without human judgment.
  • Man + Machine: The Future of Cyber Defense. Debate the best strategies for blending AI automation with human expertise, closing security gaps, and preparing for AI-driven cyber warfare.
 

John Banghart, Senior Director for Cybersecurity Services, Venable LLP

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

 

Virtual AI Summit, 2025

Virtual AI Summit, 2025

Privacy & Compliance in the Age of AI

As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy.

This session will address the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session will serve as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations.

Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, the discussion aims to shape a responsible and privacy-conscious approach to AI deployment. 

Key discussion points:

  • Privacy-preserving AI techniques: Explore cutting-edge techniques and technologies designed to enable the use of AI without compromising individual privacy, including federated learning, homomorphic encryption, and other approaches that allow AI models to be trained without accessing raw, sensitive data.
  • Consent and data governance: Examine the role of informed consent in the context of AI applications, best practices for transparently obtaining user consent, and strategies for effective data governance in compliance with evolving privacy regulations.
  • Accountability and transparency in AI practices: Discuss the importance of implementing accountability measures and ensuring transparency in AI operations to build trust and enable verification. Examine frameworks for auditing AI systems, the role of explainable AI in understanding decision-making processes, and policies for addressing biases and errors that impact privacy and data security.

Ginger Armbruster, Chief Privacy Officer and IT Division Director

 

Karen Habercoss, Chief Privacy Officer, UChicago Medicine

Virtual AI Summit, 2025

US Rep. Bill Foster on AI's Regulatory Future

Join us for a thought-provoking discussion that explores the intersection of technology, governance, and the expanding use of artificial intelligence across public and private sectors alike.
 
U.S. Rep. Foster will discuss:
 
  • How Congress, through bipartisan collaboration, is navigating the promises and complexities of AI’s transformative use cases;
  • The strategic initiatives outlined by the Task Force, including guiding principles and forward-looking recommendations;
  • Bipartisan policy proposals developed in consultation with key committees of jurisdiction.

Bill Foster, U.S. Representative, Illinois 11th Congressional District

Closing Comments

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track A

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Track B

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Culture Change: How to Instill a Mindset of Responsible Defense

They will take a deep dive  into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into:

  • API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense?
  • Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers?
  • ChatGPT: What are the potential use cases for the defender as well as the adversary?

Editor's Panel

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Past Sponsors

forcepoint

The Summit Experience

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Serverless: Accelerating Development for Data-Intensive Workloads

Future Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

Katie Jenkins

EVP & CISO , Liberty Mutual Insurance

Threat Intelligence and the Dark Web

In this session, a banking security leader and an FBI agent detail:

  • What the dark web is – and is not;
  • How to gain useful and complete information and apply it;
  • The pros and cons of going solo vs. hiring a service.