ismg.events
Open in
urlscan Pro
151.101.2.159
Public Scan
URL:
https://ismg.events/summit/north-america-west-future-ai-2024/?utm_source=Marketo&utm_medium=SolutionRoom_HTML&utm_ca...
Submission: On March 18 via api from US — Scanned from DE
Submission: On March 18 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMName: New Form — POST
<form class="elementor-form" method="post" name="New Form">
<input type="hidden" name="post_id" value="5731">
<input type="hidden" name="form_id" value="21b9e35">
<input type="hidden" name="referer_title" value="Cybersecurity Implications of AI: North America West Summit">
<input type="hidden" name="queried_id" value="15075">
<div class="elementor-form-fields-wrapper elementor-labels-above">
<div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required">
<input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-sm elementor-field-textual" placeholder="Email" required="required" aria-required="true">
</div>
<div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
<div class="elementor-field" id="form-field-field_4cf4815">
<div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-hclaxcoy1jti" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&hl=de&type=v3&v=YurWEBlMIwR4EqFPncmQTkxQ&size=invisible&badge=bottomright&sa=Form&cb=ljb83uzbahz"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
</div>
<div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons">
<button type="submit" class="elementor-button elementor-size-sm">
<span>
<span class=" elementor-button-icon">
</span>
<span class="elementor-button-text">Send</span>
</span>
</button>
</div>
</div>
</form>
Text Content
Skip to content * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About Menu * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About APRIL 16, 2024 CYBERSECURITY IMPLICATIONS OF AI SUMMIT: NORTH AMERICA WEST 9:00 AM PT - 5:00 PM PT Register Now View Agenda Overview Topics Agenda Speakers CPE Credits Register Overview Topics Agenda Speakers CPE Credits Register EVENT OVERVIEW ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges. View our ISMG Event Experience video to see what your peers are saying about their participation. VENUE MEYDENBAUER CENTER 11100 NE 6th St, Bellevue, WA 98004 NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity. HIGHLIGHT TOPICS * Leveraging AI for Defense * Balancing Privacy and Compliance * Secure AI Integration * Combatting Threats with AI * Diverse Industry AI Applications Register DAVID TSAO CISO, Instacart ERIKA VOSS Vice President, Information Security, DAT Freight & Analytics ERIC SANCHEZ CISO, Kyowa Kirin Pharmaceutical JON WASHBURN CISO, Stoel Rives JERRY COCHRAN Deputy CIO, Pacific Northwest National Labratory MATT CONNER CISO, Westinghouse Electric HEATHER WEST Senior Director, Cybersecurity and Privacy Services, Venable SEAN MURPHY Senior Vice President and Chief Information Security Officer, BECU SUHA CAN CISO, Grammarly NICOLE DARDEN FORD CISO, Nordstrom ADAM ZOLLER CISO, Providence GINGER ARMBRUSTER Chief Privacy Officer and IT Division Director, City of Seattle SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats View Faculty SAMPLE AGENDA You can now view or download a PDF version of the attendee guide. Download Agenda REGISTRATION & BREAKFAST 8:00 am PT - 9:00 am PT 9:00 am – 9:45 aM PT DAVID TSAO CISO, Instacart NICOLE DARDEN FORD CISO, Nordstrom SUHA CAN CISO, Grammarly HARNESSING AI IN CYBERSECURITY: LESSONS FROM THE C-SUITE AI’s rapid emergence across every aspect of business operations serves as both a catalyst for growth and a vector for heightened risk. Our keynote panel of leading CISOs will offer an unfiltered glimpse into the strategic deployment of artificial intelligence by information security practitioners. These industry leaders will share their direct experiences, focusing on the transformative role AI plays in enhancing security measures, the challenges of integrating AI into existing frameworks, and the innovative strategies developed to mitigate associated risks. In this exclusive discussion, panelists will dissect specific instances where AI technologies were leveraged to detect threats, streamline incident response, and predict vulnerabilities within their organizations. The discussion will navigate through the complexities of AI adoption, spotlighting the critical balance between leveraging AI for its groundbreaking potential and addressing the ethical, technical, and security challenges it introduces. Attendees will leave with a comprehensive perspective on strategic AI integration, including: * Real-World Deployment: Delve into how top organizations have successfully integrated AI into their security operations, highlighting the decision-making processes, implementation strategies, and adjustments made to align AI initiatives with security goals. * Navigating Challenges: Unpack the hurdles encountered by CISOs in adopting AI, from overcoming data bias and ensuring privacy to securing AI systems against adversarial attacks, and the practical solutions that were employed. * Mitigating Risks: Gain actionable insights into the risk management practices refined through firsthand experiences, including the development of robust frameworks to assess and mitigate the unique risks posed by AI. * Adapting to an AI-Driven Security Landscape: Learn from the foresight and adaptability of leading security practitioners as they prepare their organizations for the future, ensuring resilience against the evolving threat landscape influenced by AI. Nicole Darden Ford, CISO, Nordstrom David Tsao, CISO, Instacart Suha Can, CISO, Grammarly Watch brief video on this topic 9:45am – 10:15 aM PT GINGER ARMBRUSTER Chief Privacy Officer and IT Division Director, City of Seattle JERRY COCHRAN Deputy CIO, Pacific Northwest National Laboratory PRIVACY & COMPLIANCE IN THE AGE OF AI Artificial Intelligence has emerged as an indelible and disruptive force in information security, particularly in bolstering defensive capabilities through sophisticated data analysis and pattern recognition. As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy. This session addresses the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session serves as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations. Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, our discussion aims to shape a responsible and privacy-conscious approach to AI deployment. Key Discussion Points: * Privacy-Preserving AI Techniques: Explore cutting-edge techniques and technologies designed to enable the use of AI without compromising individual privacy, including federated learning, homomorphic encryption, and other approaches that allow AI models to be trained without accessing raw, sensitive data. * Consent and Data Governance: Examine the role of informed consent in the context of AI applications, best practices for transparently obtaining user consent, and strategies for effective data governance in compliance with evolving privacy regulations. * Accountability and Transparency in AI Practices: Discuss the importance of implementing accountability measures and ensuring transparency in AI operations to build trust and enable verification. Examine frameworks for auditing AI systems, the role of explainable AI in understanding decision-making processes, and policies for addressing biases and errors that impact privacy and data security. Ginger Armbruster, Chief Privacy Officer and IT Division Director, City of Seattle Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory 10:15 am – 10:45 Am PT ERIKA VOSS Vice President, Information Security, DAT Freight & Analytics INTELLIGENCE AMPLIFIED: AI’S ROLE IN CYBER THREAT FORECASTING AI and machine learning capabilities have ascended beyond the role of a mere tool; they have become a pivotal force in reshaping how organizations confront and adapt to threats. Its role in analyzing past incidents and identifying future vulnerabilities is essential across organizational silos and industries. In this exclusive session our panel will not just touch on the fundamentals; it’s a deep dive into the duel significance of leveraging AI to not only fortify security postures but also to proactively enhance organizational readiness. Key areas of discussion will include: * Predictive Analytics for Security Posture: Unveiling effective methods to harness predictive analytics and thoroughly assess existing security posture. * AI in Threat Intelligence: Delving into how AI can be leveraged to process vast amounts of cyber threat intelligence to predict and prevent attacks. * Machine Learning Algorithms for Pattern Recognition: An in-depth examination of how machine learning algorithms can assimilate knowledge from past security incidents to identify patterns and prevent future breaches. * Collaborative Data Initiatives: An exploration of the significance of data sharing across organizational boundaries, emphasizing the collective strength derived from collaborative defense efforts. * Role of Education in Cybersecurity: Shining a light on the indispensable role of education in building, upskilling and retaining adaptive, vigilant teams. 10:45 am – 11:15 aM PT HEATHER WEST Senior Director, Cybersecurity and Privacy Services, Venable JON WASHBURN CISO, Stoel Rives SEAN MURPHY SVP, CISO, Boeing Employees Credit Union STRATEGIC FRAMEWORKS FOR SECURE AI DEPLOYMENT: INTEGRATING AIBOMS FOR ENHANCED TRUST AND VERIFICATION As AI becomes integral to operational strategies, the imperative for secure, trustworthy, and verifiable AI deployment intensifies. This session addresses the complexities of deploying AI models securely, emphasizing the critical role of Artificial Intelligence Bills of Materials (AIBOMs) in ensuring security, trust, and accuracy. AIBOMs provide a detailed inventory of components, data sets, and environments involved in AI model development, crucial for oversight and control, especially for third-party AI applications. Unlike Software Bills of Materials (SBOMs), AIBOMs include data lineage, model training parameters, and ethical considerations, offering a comprehensive view essential for maintaining transparency and trust. This exploration into AIBOMs will highlight their importance in an organization’s security posture, detailing practical steps for AI due diligence and third-party AI platform evaluation. The discussion aims to build trust in AI through a focus on technological robustness and the continuous assurance of model accuracy and ethical deployment. Key Session Insights: * Understanding AIBOMs vs. SBOMs: Grasp the differences and the criticality of AIBOMs for a transparent, controlled AI deployment. * Building Trust in AI Systems: Explore validation methods for AI system integrity and security, ensuring alignment with organizational values and stakeholder trust. * AI Due Diligence Checklist: A guide for information security leaders to rigorously assess AI vendors, with a focus on security, accuracy, and ethical considerations. Heather West, Senior Director, Cybersecurity and Privacy Services, Venable Jon Washburn, CISO, Stoel Rives Sean Murphy, SVP, CISO, Boeing Employees Credit Union NETWORKING & EXHIBITION BREAK 11:15 am PT - 11:35 am PT 11:35 am – 12:05 pm PT JAKE GILLEN Principal Solutions Architect, Expel WHERE RISK MEETS CYBERSECURITY: A CRITICAL CONNECTION POINT Many organizations look at risk as pillars – legal, fraud, regulatory and cybersecurity. But these pillars can't be separate columns that shoulder the load. They must be interconnected. This session looks at the ways risk and security must align and integrate to avoid gaps for a more resilient organization. 12:05 pm – 12:15 pm PT RYAN PARR Senior Solutions Architect, Infoblox CONSIDERING DNS IN YOUR SECURITY STACK During this Infoblox showcase, Sr. Solutions Architect Ryan Parr will go over the importance of DNS and why it should be considered in your Security Stack. 12:15 am – 1:00 pm PT JERRY COCHRAN CIO, Pacific Northwest National Laboratory TRANSFORMATIVE DEFENSE: UTILIZING AI TO COMBAT CYBER THREATS The escalating sophistication of AI-driven cyberattacks necessitates a novel approach in cybersecurity defense mechanisms. Recent trends demonstrate adversaries utilizing AI for complex phishing campaigns, leveraging deepfake technology for identity fraud, and automating vulnerability exploitation. This session focuses on how security leaders can utilize AI technologies to enhance defense capabilities, showcasing AI’s dual potential as both a tool for attackers and a powerful ally in cybersecurity. Key insights include leveraging machine learning for predictive threat detection, employing AI-driven behavioral analytics to identify subtle anomalies in network activity, and leverage emerging capabilities to improve system robustness. The session aims to provide a strategic blueprint for integrating AI into cybersecurity frameworks, thereby not only countering AI-exploited threats but also setting a new standard for proactive defense. Key Session Insights: * Predictive Threat Detection: Implement the optimal AI strategy to forecast and neutralize threats before they manifest, drastically reducing the potential impact of cyberattacks. * Anomaly Detection through Behavioral Analytics: Utilize AI to monitor network behavior continuously, enabling the detection of deviations that signify potential security breaches, enhancing the speed and accuracy of response. * Collaborative Data Initiatives: An exploration of the significance of data sharing across organizational boundaries, emphasizing the collective strength derived from collaborative defense efforts. This session will empower cybersecurity professionals with actionable strategies for leveraging AI to build more resilient and adaptive security infrastructures, ensuring preparedness against the ever-evolving landscape of AI-exploited cyber threats. Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory LUNCH & EXHIBITION 1:00 PM pt - 1:45 PM pt 1:45 pm – 2:05 pM PT ERIC SANCHEZ CISO, Kyowa Kirin, Inc.- U.S. MATT CONNER CISO, Westinghouse Electric THE TECHNICAL LANDSCAPE OF AI: EMPOWERING CISOS FOR SECURE IMPLEMENTATION As the digital landscape continues to evolve, the integration of artificial intelligence and machine-learning technologies into organizations' operations has become increasingly prevalent. These transformative technologies hold great potential for enhancing efficiency, automation and decision-making processes. But with the tremendous benefits they offer, AI and ML also bring about unique challenges and risks that demand the attention of chief information security officers. This session is designed specifically for CISOs seeking to fortify their understanding of AI technologies and their implications on cybersecurity. Key topics covered during the session will include: * Fundamentals of AI and ML: Understanding the core principles and algorithms behind AI and ML technologies, which enable CISOs to grasp the underlying mechanics behind AI-driven applications. * AI in Cybersecurity: Exploring the current landscape of AI applications in the realm of cybersecurity, including threat detection, anomaly identification and risk assessment, along with insights into the potential for AI-driven attacks. * Adversarial AI and Mitigation Strategies: Analyzing the concept of adversarial AI, its potential to subvert AI systems, and best practices for safeguarding AI algorithms from malicious attacks. * Explainable AI: Unraveling the black box nature of AI algorithms and methods to enhance transparency and interpretability, which are essential for building trust and gaining organizational buy-in. * AI Governance and Risk Management: Highlighting the significance of comprehensive AI governance frameworks and risk management strategies to mitigate potential AI-related risks effectively. * Collaborating With AI Teams: Strategies for fostering collaboration between CISOs and AI development teams, which facilitates a cohesive approach to security in AI projects. 2:05 pm – 3:25 pM PT NADER ZAVERI Senior Manager - Incident Response & Remediation, Mandiant JERRY COCHRAN Deputy CIO, Pacific Northwest National Laboratory U.S SECRET SERVICE DEEP FAKES, REAL STAKES: UNMASKING CYBER DECEPTION IN A HIGH-STAKES TABLETOP SIMULATION Join us for this collaborative tabletop exercise, hosted jointly by the United States Secret Service and CyberEdBoard. This interactive session is meticulously crafted to mimic a sophisticated cyber-attack. It aims to bolster strategic response capabilities and enhance operational readiness against the backdrop of advanced cyber threats. The focal point of this exercise is a strategically crafted deep fake incident targeting a corporate executive, weaving together elements of social engineering, financial fraud, and the challenges posed by emerging technological threats. What You Will Gain From This Experience * Enhanced Organizational Readiness: To critically assess and improve organizational preparedness in responding to intricate cyber incidents involving deep fake technology and social engineering. * Interagency Collaboration and Knowledge Exchange: To strengthen the partnership and information sharing between the Secret Service and leaders in the private sector cybersecurity community. * Strategic Response Development: To create all-encompassing incident response strategies that cover legal, technical, and communicational facets, while also identifying and rectifying weaknesses in existing cybersecurity policies and governance. NETWORKING & EXHIBITION BREAK 3:25 pm pT – 3:45 pM pt 3:45 pm – 4:15 pm PT VINIT TOPLE Fmr. Head of Gen AI Product Portfolio HEATHER WEST Senior Director, Cybersecurity and Privacy Services, Venable NAVIGATING THE MAZE: OPEN PLATFORMS VS. OPEN SOURCE IN LLM SECURITY The escalating sophistication of AI-driven cyberattacks necessitates a novel approach in cybersecurity defense mechanisms. Recent trends demonstrate adversaries utilizing AI for complex phishing campaigns, leveraging deepfake technology for identity fraud, and automating vulnerability exploitation. This session focuses on how security leaders can repurpose AI technologies to enhance defense capabilities, showcasing AI's dual potential as both a tool for attackers and a powerful ally in cybersecurity. With the rapidly advancing applications for Large Language Models (LLMs), the distinction between open platforms and open-source initiatives presents a critical juncture for security. This session dives into the nuanced security implications of utilizing proprietary services from third parties compared to engaging with open-source LLM projects. With the backdrop of recent inquiries by entities like the NTIA into the risks and benefits of publicly available model weights, our discussion is timely and essential for information security leaders. As organizations navigate the decision between open platforms and open-source models, understanding the unique security challenges and opportunities each presents is paramount. This session aims to demystify these distinctions, providing CISOs, CIOs, and VPs of Information Security with a clear roadmap for assessing and integrating LLM technologies securely into their operations. Key Takeaways: * Comprehensive Risk Analysis: Learn to conduct a thorough security assessment for both open platforms and open-source LLMs, highlighting key vulnerabilities and mitigation strategies. * Strategic Implementation Guidance: Gain insights into best practices for safely implementing LLM solutions, whether they are sourced from open platforms or open-source communities, ensuring robust security postures without sacrificing innovation. * Regulatory and Compliance Considerations: Understand the evolving regulatory landscape affecting LLM deployments, including how to navigate compliance while leveraging public model weights and contributing to open-source projects. Heather West, Senior Director, Cybersecurity and Privacy Services, Venable Vinit Tople, Fmr. Head of Gen AI Product Portfolio, Alexa Automotive, Amazon 4:15 pm – 4:45 pM PT JON WASHBURN CISO, Stoel Rives ERIKA VOSS Vice President, Information Security, DAT Freight & Analytics ERIK SANCHEZ CISO, Kyowa Kirin, Inc. - U.S. SEAN MURPHY SVP, CISO, Boeing Employees Credit Union BEYOND SILOS: AI ADOPTION ACROSS INDUSTRIES AI adoption has varied across industries, with different sectors serving as laboratories of innovation in their approach. From financial services and healthcare to legal, manufacturing, and logistics, each sector faces unique challenges in leveraging AI for operational efficiency and security enhancement in their respective domains. In this open and candid discussion, esteemed information security leaders from diverse fields will offer a panoramic view of AI’s impact across the business spectrum. Participants will benefit from an in-depth exploration of how different industries are not only utilizing AI but also navigating the complexities of its adoption, with a special focus on the lessons learned in the process. Our closing panel will unveil the nuances of AI integration within their sectors, shedding light on how AI technologies have been implemented to optimize operations, enhance customer experiences, and bolster security postures against increasingly sophisticated threats. More importantly, this session aims to distill the collective experiences of these industry leaders into actionable insights, highlighting the common hurdles encountered during AI adoption, from ethical dilemmas and regulatory challenges to technical obstacles and workforce implications. Key Session Insights: * Industry-Specific Insight: Learn how different industries are leveraging AI for both operational excellence and enhanced security, highlighting innovative uses and strategic deployments. * Common Challenges and Solutions: A comprehensive look at shared difficulties, including data privacy concerns, algorithm bias, and the integration with legacy systems, alongside the strategies developed to overcome them. * Critical Lessons Learned: Valuable takeaways from each industry’s experience with AI, offering a roadmap of best practices, cautionary tales, and innovative solutions that have emerged from real-world applications. * Forward-Looking Strategies: Gain perspective on future developments of AI in each sector, considering future applications, potential disruptions, and the ongoing need for cross-industry collaboration and learning. Jon Washburn, CISO, Stoel Rives Erika Voss, Vice President, Information Security, DAT Freight & Analytics Eric Sanchez, CISO, Kyowa Kirin, Inc.- U.S. Sean Murphy, SVP, CISO, Boeing Employees Credit Union CLOSING COMMENTS 4:45 pm – 5:00 PM pt REGISTER RSVP here to attend our events. You can select for multiple or individual tickets. NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity. CYBERSECURITY IMPLICATIONS OF AI SUMMIT: NORTH AMERICA WEST Apr 16 - 17, 2024 RSVP Available till Apr 16, 2024 (04:28 AM) Add Please enter your email to continue I agree to the Terms and Conditions and Privacy Policy. Proceed SPONSORS Upcoming ISMG Events MAY 15, 2024 Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience See Event APRIL 16, 2024 Cybersecurity Implications of AI Summit: North America West Summit See Event APRIL 24, 2024 Securing OT/IoT in the Age of Automation and Cloud Integration See Event JUNE 13, 2024 Cybersecurity & Business Transformation Summit: Bengaluru See Event APRIL 10, 2024 Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare See Event EVENT * Summits * Engage * Roundtables * Custom Events * Summits * Engage * Roundtables * Custom Events ABOUT * Sponsorship * Leadership * Company * Privacy Policy * Sponsorship * Leadership * Company * Privacy Policy @ISMG_News #ISMGEngage SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS Send