August 15, 2024

AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities

10:00 AM ET - 3:00 PM ET

virtual event

Event Overview

The Virtual AI Summit by ISMG delves into a dynamic exploration of the intersection between AI and cybersecurity. Take a deep dive into ethical considerations, LLM security, and the intricate impacts on privacy and intellectual property. Engage directly with industry leaders to uncover the synergy between human intelligence and AI in fortifying cybersecurity, with a special focus on AI-driven threat detection and risk management strategies. This summit equips security professionals with vital AI insights, promoting transparent governance and hands-on application through sessions dedicated to real-world cybersecurity challenges. Expect a day packed with strategic dialogues, invaluable insights, and collaborative exploration at the forefront of AI and cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about their participation. 

Highlight Topics

  • Leveraging AI for Defense
  • Balancing Privacy and Compliance
  • Secure AI Integration
  • Combating Threats With AI
  • Diverse Industry AI Applications

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Robert Costello

Chief Information Officer, CISA

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Ginger Armbruster

Chief Privacy Officer and IT Division Director, City of Seattle, WA

Tyler Maddry

Partner, Hunton Andrews Kurth LLP

Lisa Sotto

Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP

Kenneth Townsend

CISO, Ingredion

E.P. Mathew

Deputy CIO, Defense Intelligence Agency

Imran Ahmad

Partner/Canadian Head of Technology, Norton Rose Fulbright

John Horn

Director, Cybersecurity Practice, Datos Insights

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

Anahi Santiago

CISO, ChristianaCare

Ray Griffin

CISO and Head of Information Security, Cox Media Group

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

You can now view or download a PDF version of the attendee guide.

Opening Remarks

Robert Costello

Chief Information Officer, CISA

A Road Map for New Terrain: Strategic Insights From CISA's CIO Robert Costello

Costello will share insight from CISA’s strategic action plan, which focuses on responsible AI use, securing AI systems and mitigating AI-related threats to critical infrastructure. Additionally, the discussion will highlight the evolving cyber risks and how AI can be leveraged to enhance national security. Attendees will also learn how their organizations can utilize AI to enhance their cybersecurity posture, with insights into CISA’s available resources and collaborative opportunities. This is a unique opportunity for information security practitioners in government to gain valuable insights from one of the leading voices in the field.

Key takeaways:

  • Detailed understanding of CISA’s AI road map: Learn the specific steps and timelines in CISA’s comprehensive plan for integrating AI into national cybersecurity efforts, including key initiatives and expected outcomes. 
  • Best Practices for secure AI system development: Gain in-depth knowledge of CISA’s guidelines for secure AI system development, including specific risk mitigation techniques, compliance requirements, and examples of successful implementation. 
  • Advanced strategies to protect critical infrastructure: Discover CISA’s latest strategies for using AI to defend against sophisticated threats targeting critical infrastructure, with real-world examples, actionable recommendations, and insights into collaboration with international partners and private sector stakeholders. 
  • Leveraging AI for enhanced cybersecurity: Explore how organizations can implement AI to improve their cybersecurity posture, utilizing resources and guidance from CISA to stay ahead of emerging threats and enhance overall cyber resilience. 

Robert Costello, Chief Information Officer, CISA

Virtual Cybersecurity Summit

Cloud Security Maturity and the Need for Proactive and Reactive Approaches

Security leaders are constantly trying to improve their overall security posture. Some primarily focus on reducing risk and others maintain a detection-first mindset. So, what is the right approach?

The answer is both. But which approach should be the focus today depends on the enterprise’s security maturity.

In this session, we will discuss:

  • What cloud security maturity is and the path to achieving it;
  • Creating an effective security backstop with cloud detection and response;
  • How reactive security should be an enabler for proactive security.

Shashank Golla, Product Marketing Manager, Wiz

Ginger Armbruster

Chief Privacy Officer and IT Division Director, City of Seattle, Washington

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Privacy and Compliance in the Age of AI

As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy.

This session will serve the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session serves as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations.

Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, our discussion aims to shape a responsible and privacy-conscious approach to AI deployment. 

Key discussion points:

  • Privacy-preserving AI techniques: Explore cutting-edge techniques and technologies designed to enable the use of AI without compromising individual privacy, including federated learning, homomorphic encryption, and other approaches that allow AI models to be trained without accessing raw, sensitive data.
  • Consent and data governance: Examine the role of informed consent in the context of AI applications, best practices for transparently obtaining user consent, and strategies for effective data governance in compliance with evolving privacy regulations.
  • Accountability and transparency in AI practices: Discuss the importance of implementing accountability measures and ensuring transparency in AI operations to build trust and enable verification. Examine frameworks for auditing AI systems, the role of explainable AI in understanding decision-making processes, and policies for addressing biases and errors that impact privacy and data security.

Ginger Armbruster, Chief Privacy Officer and IT Division Director,

City of Seattle, Washington

 

Karen Habercoss, Chief Privacy Officer, UChicago Medicine 

Jason Cook

AVP Worldwide Partner Sales Engineering, Rubrik

AI-Driven Cyber Investigations

Couple this with the complexity of navigating your own unique data estate and infrastructure and the constantly evolving nature of attacks. Making mistakes can cost millions along with irreparable brand damage. And if we are talking about critical infrastructure impacted by cyber attacks, such as healthcare and public utilities, human lives could be at stake.

Cook will discuss how IT and security teams, at all levels of cyber expertise, can leverage AI to accelerate cyber investigation and recovery.

Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik

E.P. Mathew

Deputy CIO, Defense Intelligence Agency

Kenneth Townsend

CISO, Ingredion

Richard Rushing

CISO, Motorola Mobility

Scott Hellman

Supervisory Special Agent, FBI

Transformative Defense: Utilizing AI to Combat Cyberthreats

Recent trends demonstrate adversaries utilizing AI for complex phishing campaigns, leveraging deepfake technology for identity fraud and automating vulnerability exploitation. This session focuses on how security leaders can utilize AI technologies to enhance defense capabilities, showcasing AI’s dual potential as both a tool for attackers and a powerful ally in cybersecurity.


Key insights include leveraging machine learning for predictive threat detection, employing AI-driven behavioral analytics to identify subtle anomalies in network activity, and using emerging capabilities to improve system robustness. The session aims to provide a strategic blueprint for integrating AI into cybersecurity frameworks, thereby not only countering AI-exploited threats but also setting a new standard for proactive defense.

Key takeaways:

  • Predictive threat detection: Implement the optimal AI strategy to forecast and neutralize threats before they manifest, drastically reducing the potential impact of cyberattacks.
  • Anomaly detection through behavioral analytics: Utilize AI to monitor network behavior continuously, enabling the detection of deviations that signify potential security breaches, enhancing the speed and accuracy of response.
  • Collaborative data initiatives: An exploration of the significance of data sharing across organizational boundaries, emphasizing the collective strength derived from collaborative defense efforts.

This session will empower cybersecurity professionals with actionable strategies for leveraging AI to build more resilient and adaptive security infrastructures, ensuring preparedness against the ever-evolving landscape of AI-exploited cyber threats.

E.P. Mathew, Deputy CIO, Defense Intelligence Agency

Kenneth Townsend, CISO, Ingredion

Richard Rushing, CISO, Motorola Mobility 

Scott Hellman, Supervisory Special Agent, FBI

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

David Anderson

Vice President, Cyber, Woodruff Sawyer

Anahi Santiago

CISO, ChristianaCare

Alex Vitruk

Senior Associate Attorney, BakerHostetler

AI in Healthcare: Addressing Bias and Security Risks

However, as AI algorithms increasingly influence medical decision-making, concerns about bias and discrimination have become more apparent. These biases can arise from inherent issues in AI datasets, algorithmic design, and implementation, potentially perpetuating disparities in healthcare delivery and outcomes. This session will delve into the ethical, legal, and security implications of healthcare discrimination facilitated by AI, including the erosion of trust, patient harm, and legal challenges. We will explore how AI’s blind spots can inadvertently reinforce existing biases and how representative datasets can help mitigate these challenges.
 
Join us to examine the following key areas:
 
Biases in AI datasets: Understand how biases in training data can lead to unequal healthcare outcomes and discuss the importance of using diverse and representative datasets.
 
Algorithmic design, implementation and security: Analyze how design choices and system vulnerabilities can influence the fairness and safety of AI applications.
 
•Mitigation and protection strategies: Discuss effective strategies to mitigate bias in AI healthcare applications, emphasizing the need for ongoing oversight, ethical standards, and robust security measures to ensure equitable and ethical use of AI in healthcare.
 

Heather West, Senior Director, Cybersecurity and Privacy Services, Venable

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

Alex Vitruk, Senior Associate Attorney, BakerHostetler

Lisa Sotto

Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP

Tyler Maddry

Partner, Hunton Andrews Kurth LLP

IP and Privacy Law Issues in Generative AI for Cyber Leaders

This session, tailored for experienced cybersecurity practitioners, will delve into the critical legal issues surrounding gen AI. The session will provide an overview of the latest gen AI technologies and their implications. It will explore intellectual property law issues, including potential legal risks, IP litigation, indemnification, and practical legal recommendations. Additionally, it will address privacy and cybersecurity law, emphasizing the importance of these principles and the unique risks posed by gen AI. Attendees will gain insights into the U.S. regulatory landscape and the EU AI Act, essential legal considerations for maintaining privacy and cybersecurity, and best practices for AI governance. This comprehensive session aims to equip cybersecurity practitioners with the knowledge and strategies needed to navigate the evolving legal landscape of gen AI effectively.

Key takeaways: 

  • Understand the latest gen AI technologies and their impact on cybersecurity;
  • Identify and mitigate IP risks associated with AI;
  • Navigate the complex regulatory landscapes of privacy and cybersecurity law;
  • Implement AI governance practices to ensure ethical and compliant use of AI.
 

Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity

Practice, Hunton Andrews Kurth LLP

 

Tyler Maddry, Partner, Hunton Andrews Kurth LLP

Peeyush Patel

CISO, XPO

Jeremy Daily

Associate Professor, Colorado State University

Securing the Road: Why Vulnerabilities in Electric Logging Devices Are Everyone's Problem

 This session, tailored for CISOs and cybersecurity leaders across various industries, will provide crucial insights into these vulnerabilities. While the primary focus is on transportation, the speakers’ insights into IoT vulnerabilities, wireless network security, and firmware integrity will be applicable to many sectors, including manufacturing, healthcare, finance, and critical infrastructure. Learn how ELDs, mandated to track driving hours and log critical vehicle data, can be exploited via Bluetooth or Wi-Fi connections, leading to unauthorized control, data manipulation, and malware propagation. These insights are not just crucial for the transportation sector but resonate across all industries reliant on interconnected and IoT systems.
 
The final vulnerability, and perhaps the most concerning, is the potential for a self-propagating truck-to-truck worm, which takes advantage of the inherent networked nature of these devices. Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications.
 
Key takeaways:
 
  • Understanding the parallels between ELD vulnerabilities and broader IoT security challenges affecting various industries;
  • Practical measures to safeguard interconnected systems and prevent widespread operational disruptions;
  • The importance of cross-industry collaboration in tackling emerging cybersecurity threats.
 

Peeyush Patel, CISO, XPO

 

Jeremy Daily, Associate Professor, Colorado State University

Imran Ahmad

Partner, Canadian Head of Technology, Norton Rose Fulbright

Ray Griffin

CISO and Head of Information Security, Cox Media Group

John Horn

Director, Cybersecurity Practice, Datos Insights

Harnessing AI in Cybersecurity: Lessons From the C-Suite

 Our panel of leading CISOs will offer an unfiltered glimpse into the strategic deployment of AI by information security practitioners. These industry leaders will share their direct experiences, focusing on the transformative role AI plays in enhancing security measures, the challenges of integrating AI into existing frameworks, and the innovative strategies developed to mitigate associated risks. Attendees will leave with a comprehensive perspective on strategic AI integration, including:
 
  •  Real-World deployment: Delve into how top organizations have successfully integrated AI into their security operations, highlighting the decision-making processes, implementation strategies, and adjustments made to align AI initiatives with security goals.
  • Navigating challenges: Unpack the hurdles encountered by CISOs in adopting AI, from overcoming data bias and ensuring privacy to securing AI systems against adversarial attacks, and the practical solutions that were employed.
  • Mitigating risks: Gain actionable insights into the risk management practices refined through firsthand experiences, including the development of robust frameworks to assess and mitigate the unique risks posed by AI.
  • Adapting to an AI-driven security landscape: Learn from the foresight and adaptability of leading security practitioners as they prepare their organizations for the future, ensuring resilience against the evolving threat landscape influenced by AI.

Imran Ahmad, Partner, Canadian Head of Technology, Norton   

Rose Fulbright

 

Ray Griffin, CISO and Head of Information Security, Cox Media   

Group

 

John Horn, Director, Cybersecurity Practice, Datos Insights

Bill Foster

U.S. Representative, Illinois 11th Congressional District

US Rep. Bill Foster on AI's Regulatory Future

Join us for a thought-provoking discussion that explores the intersection of technology, governance, and the expanding use of artificial intelligence across public and private sectors alike.
 
US Rep. Foster will discuss:
 
  • How Congress, through bipartisan collaboration, is navigating the promises and complexities of AI’s transformative use cases;
  • The strategic initiatives outlined by the Taskforce, including guiding principles and forward-looking recommendations;
  • Bipartisan policy proposals developed in consultation with key committees of jurisdiction.

Bill Foster, U.S. Representative, Illinois 11th Congressional

District

Closing Comments

Don’t miss your chance to attend this dynamic impactful event

#ISMGSummit

@ISMG_News

Sponsors

Gary Phipps

Vice President Strategy & Business Transformation, GRCP CTPRP, CyberGRX

Rob Knoblauch

Deputy CISO and VP Global Security Services , Scotiabank

Matanda Doss

Executive Director, Cybersecurity and Technology Controls, Commercial Bank JPMorgan Chase & Co.

Greg Thompson

VP, CISO, ManuLife

Aaron Bostick

CISO, ThriveDX

Eric Sanchez

CISO, Kyowa Kirin Pharmaceutical

Colin Barry

Director, Cyber Threat Intelligence Expedia Group

Michael Bray

CISO, The Vancouver Clinic

Speakers

Thought Leaders on Stage and Leading Deep Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats 

Register

RSVP here to attend our events. You can select for multiple or individual tickets. 

The Summit Experience

CPE Credits

ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.

Future Events

July 16, 2024

MLOps and the Role of Gen AI in Securing the Software Supply Chain

July 18, 2024

Healthcare Cybersecurity Summit: New York

July 18, 2024

AI Empowerment at Workplace: Revolutionizing Collaboration and Customer Engagement

July 23, 2024

Cyber Security Readiness with Splunk

August 15, 2024

AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities

Future Events

July 16, 2024

MLOps and the Role of Gen AI in Securing the Software Supply Chain

July 18, 2024

Healthcare Cybersecurity Summit: New York

July 18, 2024

AI Empowerment at Workplace: Revolutionizing Collaboration and Customer Engagement