ismg.events Open in urlscan Pro
151.101.2.159  Public Scan

Submitted URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGUs2POv89GV5NzqJ2Y7shuLCehBtEHIW49EceDtdCg2rSuF-RQ6uXNHGlCr12ZbDpDMxUhMrI=
Effective URL: https://ismg.events/summit/virtual-cybersecurity-2024/?utm_source=Marketo&utm_medium=FullAgenda_HTML&utm_campaign=En...
Submission: On August 05 via api from TR — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

AUGUST 15, 2024


AI'S DOUBLE-EDGED SWORD: NAVIGATING RISKS WHILE UNLOCKING OPPORTUNITIES


10:00 AM ET - 3:00 PM ET | VIRTUAL EVENT

Register Now


ON DEMAND AUGUST 16, 2024


Overview
Topics
Agenda
Speakers
CPE Credits
Register

Overview
Topics
Agenda
Speakers
CPE Credits
Register



EVENT OVERVIEW

The Virtual AI Summit by ISMG delves into a dynamic exploration of the
intersection between AI and cybersecurity. Take a deep dive into ethical
considerations, LLM security, and the intricate impacts on privacy and
intellectual property. Engage directly with industry leaders to uncover the
synergy between human intelligence and AI in fortifying cybersecurity, with a
special focus on AI-driven threat detection and risk management strategies. This
summit equips security professionals with vital AI insights, promoting
transparent governance and hands-on application through sessions dedicated to
real-world cybersecurity challenges. Expect a day packed with strategic
dialogues, invaluable insights, and collaborative exploration at the forefront
of AI and cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about
their participation. 

Download our Summit Brochure




HIGHLIGHT TOPICS

 * Leveraging AI for Defense
 * Balancing Privacy and Compliance
 * Secure AI Integration
 * Combating Threats With AI
 * Diverse Industry AI Applications

Register


ROBERT COSTELLO

Chief Information Officer, CISA


KAREN HABERCOSS

Chief Privacy Officer, UChicago Medicine


GINGER ARMBRUSTER

Chief Privacy Officer and IT Division Director, City of Seattle, WA


TYLER MADDRY

Partner, Hunton Andrews Kurth LLP


LISA SOTTO

Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews
Kurth LLP


KENNETH TOWNSEND

CISO, Ingredion


E.P. MATHEW

Deputy CIO, Defense Intelligence Agency


IMRAN AHMAD

Partner/Canadian Head of Technology, Norton Rose Fulbright


JOHN HORN

Director, Cybersecurity Practice, Datos Insights


HEATHER WEST

Senior Director, Cybersecurity and Privacy Services, Venable


ANAHI SANTIAGO

CISO, ChristianaCare


RAY GRIFFIN

CISO and Head of Information Security, Cox Media Group


SPEAKERS


THOUGHT LEADERS ON STAGE LEADING DEEP-DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in cybersecurity passionate about the latest tools and technology to
defend against threats.

View Faculty




OPENING REMARKS

9:55 am et - 10:00 am et

10:00 am - 10:30 am


ROBERT COSTELLO

Chief Information Officer, CISA


A ROAD MAP FOR NEW TERRAIN: STRATEGIC INSIGHTS FROM CISA'S CIO ROBERT COSTELLO

Join us for an insightful keynote fireside chat with Robert Costello, chief
information officer of CISA, as he discusses the dynamic intersection of
artificial intelligence and cybersecurity. This session will cover the pivotal
work CISA is doing to integrate AI in bolstering cyber defenses, including their
recently developed AI road map.

Costello will share insight from CISA’s strategic action plan, which focuses on
responsible AI use, securing AI systems and mitigating AI-related threats to
critical infrastructure. Additionally, the discussion will highlight the
evolving cyber risks and how AI can be leveraged to enhance national security.
Attendees will also learn how their organizations can utilize AI to enhance
their cybersecurity posture, with insights into CISA’s available resources and
collaborative opportunities. This is a unique opportunity for information
security practitioners in government to gain valuable insights from one of the
leading voices in the field.

Key takeaways:

 * Detailed understanding of CISA’s AI road map: Learn the specific steps and
   timelines in CISA’s comprehensive plan for integrating AI into national
   cybersecurity efforts, including key initiatives and expected outcomes. 
 * Best Practices for secure AI system development: Gain in-depth knowledge of
   CISA’s guidelines for secure AI system development, including specific risk
   mitigation techniques, compliance requirements, and examples of successful
   implementation. 
 * Advanced strategies to protect critical infrastructure: Discover CISA’s
   latest strategies for using AI to defend against sophisticated threats
   targeting critical infrastructure, with real-world examples, actionable
   recommendations, and insights into collaboration with international partners
   and private sector stakeholders. 
 * Leveraging AI for enhanced cybersecurity: Explore how organizations can
   implement AI to improve their cybersecurity posture, utilizing resources and
   guidance from CISA to stay ahead of emerging threats and enhance overall
   cyber resilience. 

Robert Costello, Chief Information Officer, CISA

10:30 AM - 11:00 AM


SHAKED ROTLEVI

Technical Product Marketing Manager, Wiz


ACCELERATE AI INNOVATION SECURELY WITH AI-SPM

As organizations increasingly migrate to the cloud, the landscape of
cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence
(AI) brings both unprecedented opportunities and challenges, making it important
for cloud security strategies to advance accordingly.

Join this session to hear from Wiz why organizations are adopting AI-SPM (AI-
Security Posture Management) into their CNAPP strategy and how you can
effectively secure AI workloads in the cloud while accelerating AI innovation
securely.

Shaked Rotlevi, Technical Product Marketing Manager, Wiz

11:00 am - 11:30 am


TIM GALLO

Head of Global Solutions Architects, Google


AN IN DEPTH LOOK AT AI & THE EVOLVING CYBER THREAT LANDSCAPE

In the rapidly evolving landscape of cyber warfare, understanding and responding
to the latest threats is crucial. This session offers unparalleled insights
tailored to the frontline incident response and threat intelligence experts who
tackle high-impact cyberattacks daily. We will cover the current threat
landscape, evolutions in the attack surface, the role of AI in cybersecurity,
advancements and shortcomings in defenses, and how Google Cloud is helping to
bridge critical security gaps. Join us to equip yourself with the knowledge and
strategies needed to navigate the complexities of modern cyber threats.
Key discussion points:
 *  Current Threat Landscape: Identifying the most significant attacks and
   attackers impacting organizations today. Understand the prevalent and
   dangerous cyber threats that enterprises face.
 * Evolving Attack Surface: Assessing how the attack surface has changed over
   the past year and the implications for security strategies. Explore how
   digital transformation and remote work have expanded vulnerabilities.
 * AI in Cybersecurity: Exploring the dual role of AI in both facilitating cyber
   attacks and bolstering cybersecurity defenses. Discuss how AI is used by
   adversaries and defenders alike.
 * Defensive Adaptations: Reviewing the advancements and shortcomings in
   security defenses over the past year. Highlight effective measures, existing
   gaps, and innovative solutions.

Tim Gallo, Head of Global Solutions Architects, Google

 

12:00 pm - 12:30 pm


LIQUIAN LIM

Senior Product Marketing Manager, Snyk


BUILDING TOMORROW SECURELY... SECURING THE USE OF AI IN APP DEVELOPMENT

Join Liqian Lim, Senior Product Marketing Manager, AI/ML at Snyk, a developer
security platform for application security, as she talks about how organisations
can build tomorrow with AI – securely.

In this session, we will cover:

 * The importance of AI-fitness and wellness.
 * The risks of not being secure before adoption.
 * Surprising survey results on organisational AI readiness.
 * Foundational steps to building an AI. protection strategy for your SDLC.
 * Key features to look out for in your chosen protection.

Liquian Lim, Senior Product Marketing Manager, Snyk

1:00 pm - 1:15 pm


JASON COOK

AVP Worldwide Partner Sales Engineering, Rubrik


AI-DRIVEN CYBER INVESTIGATIONS

Dealing with the barrage of cyber incidents, knowing when to sound the alarm,
how to react, what to investigate, and how to recover are no easy feats for IT
and security teams.

Couple this with the complexity of navigating your own unique data estate and
infrastructure and the constantly evolving nature of attacks. Making mistakes
can cost millions along with irreparable brand damage. And if we are talking
about critical infrastructure impacted by cyberattacks, such as healthcare and
public utilities, human lives could be at stake.

Cook will discuss how IT and security teams, at all levels of cyber expertise,
can leverage AI to accelerate cyber investigation and recovery.

Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik

1:15 pm - 2:00 pm


LISA SOTTO

Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton
Andrews Kurth LLP


TYLER MADDRY

Partner, Hunton Andrews Kurth LLP


IP AND PRIVACY LAW ISSUES IN GENERATIVE AI FOR CYBER LEADERS

As gen AI becomes an integral tool in cybersecurity, it brings transformative
potential alongside intricate legal challenges.

This session, tailored for experienced cybersecurity practitioners, will delve
into the critical legal issues surrounding gen AI. The session will provide an
overview of the latest gen AI technologies and their implications. It will
explore intellectual property law issues, including potential legal risks, IP
litigation, indemnification, and practical legal recommendations. Additionally,
it will address privacy and cybersecurity law, emphasizing the importance of
these principles and the unique risks posed by gen AI. Attendees will gain
insights into the U.S. regulatory landscape and the EU AI Act, essential legal
considerations for maintaining privacy and cybersecurity, and best practices for
AI governance. This comprehensive session aims to equip cybersecurity
practitioners with the knowledge and strategies needed to navigate the evolving
legal landscape of gen AI effectively.

Key takeaways: 

 * Understand the latest gen AI technologies and their impact on cybersecurity;
 * Identify and mitigate IP risks associated with AI;
 * Navigate the complex regulatory landscapes of privacy and cybersecurity law;
 * Implement AI governance practices to ensure ethical and compliant use of AI.

 

Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity

Practice, Hunton Andrews Kurth LLP

 

Tyler Maddry, Partner, Hunton Andrews Kurth LLP

2:00 PM - 2:30 PM

Track A


SECURING THE ROAD: WHY VULNERABILITIES IN ELECTRIC LOGGING DEVICES ARE
EVERYONE'S PROBLEM


PEEYUSH PATEL

CISO, XPO


JEREMY DAILY

Associate Professor, Colorado State University
As cyberthreat actors adapt and enhance their methods, the vulnerabilities in
electronic logging devices (ELDs) used in over 14 million medium- and heavy-duty
commercial trucks in the United States serve as a stark reminder of the
widespread impact of insecure IoT systems.
This session, tailored for CISOs and cybersecurity leaders across various
industries, will provide crucial insights into these vulnerabilities. While the
primary focus is on transportation, the speakers’ insights into IoT
vulnerabilities, wireless network security, and firmware integrity will be
applicable to many sectors, including manufacturing, healthcare, finance, and
critical infrastructure. Learn how ELDs, mandated to track driving hours and log
critical vehicle data, can be exploited via Bluetooth or Wi-Fi connections,
leading to unauthorized control, data manipulation, and malware propagation.
These insights are not just crucial for the transportation sector but resonate
across all industries reliant on interconnected and IoT systems.
 
The final vulnerability, and perhaps the most concerning, is the potential for a
self-propagating truck-to-truck worm, which takes advantage of the inherent
networked nature of these devices. Such an attack could lead to widespread
disruptions in commercial fleets, with severe safety and operational
implications.
 
Key takeaways:
 
 * Understanding the parallels between ELD vulnerabilities and broader IoT
   security challenges affecting various industries;
 * Practical measures to safeguard interconnected systems and prevent widespread
   operational disruptions;
 * The importance of cross-industry collaboration in tackling emerging
   cybersecurity threats.

 

Peeyush Patel, CISO, XPO

 

Jeremy Daily, Associate Professor, Colorado State University

Track B


AI IN HEALTHCARE: ADDRESSING BIAS AND SECURITY RISKS


HEATHER WEST

Senior Director, Cybersecurity and Privacy Services, Venable


DAVID ANDERSON

Vice President, Cyber, Woodruff Sawyer


ANAHI SANTIAGO

CISO, ChristianaCare


ALEX VITRUK

Senior Associate Attorney, BakerHostetler
AI holds immense promise in revolutionizing healthcare, from fast-tracking
research and development to providing earlier diagnoses to personalized
treatment plans.
However, as AI algorithms increasingly influence medical decision-making,
concerns about bias and discrimination have become more apparent. These biases
can arise from inherent issues in AI datasets, algorithmic design, and
implementation, potentially perpetuating disparities in healthcare delivery and
outcomes. This session will delve into the ethical, legal, and security
implications of healthcare discrimination facilitated by AI, including the
erosion of trust, patient harm, and legal challenges. We will explore how AI’s
blind spots can inadvertently reinforce existing biases and how representative
datasets can help mitigate these challenges.
 
Join us to examine the following key areas:
 
 * Biases in AI datasets: Understand how biases in training data can lead to
   unequal healthcare outcomes and discuss the importance of using diverse and
   representative datasets.
 * Algorithmic design, implementation and security: Analyze how design choices
   and system vulnerabilities can influence the fairness and safety of AI
   applications.
 * Mitigation and protection strategies: Discuss effective strategies to
   mitigate bias in AI healthcare applications, emphasizing the need for ongoing
   oversight, ethical standards, and robust security measures to ensure
   equitable and ethical use of AI in healthcare.

 

Heather West, Senior Director, Cybersecurity and Privacy Services, Venable

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

Alex Vitruk, Senior Associate Attorney, BakerHostetler

2:30 pm - 3:00 pm

Track A


PRIVACY & COMPLIANCE IN THE AGE OF AI


GINGER ARMBRUSTER

Chief Privacy Officer and IT Division Director, City of Seattle, Washington


KAREN HABERCOSS

Chief Privacy Officer, UChicago Medicine
Artificial intelligence has emerged as an indelible and disruptive force in
information security, particularly in bolstering defensive capabilities through
sophisticated data analysis and pattern recognition.

As organizations harness the power of AI to fortify their cybersecurity posture,
a pivotal challenge emerges: striking the delicate balance between robust threat
prevention and the protection of individual and organizational privacy.

This session will address the need to safeguard data privacy, along with the
governance and compliance considerations necessitated by the proliferation of AI
utilization. Beyond simply identifying challenges, this session will serve as a
practical guide, offering actionable strategies for the ethical implementation
of AI in cybersecurity operations.

Tailored for CISOs, IT professionals, data scientists, and all stakeholders
intrigued by the intricate interplay of AI, ethics, and security, the discussion
aims to shape a responsible and privacy-conscious approach to AI deployment. 

Key discussion points:

 * Privacy-preserving AI techniques: Explore cutting-edge techniques and
   technologies designed to enable the use of AI without compromising individual
   privacy, including federated learning, homomorphic encryption, and other
   approaches that allow AI models to be trained without accessing raw,
   sensitive data.
 * Consent and data governance: Examine the role of informed consent in the
   context of AI applications, best practices for transparently obtaining user
   consent, and strategies for effective data governance in compliance with
   evolving privacy regulations.
 * Accountability and transparency in AI practices: Discuss the importance of
   implementing accountability measures and ensuring transparency in AI
   operations to build trust and enable verification. Examine frameworks for
   auditing AI systems, the role of explainable AI in understanding
   decision-making processes, and policies for addressing biases and errors that
   impact privacy and data security.

Ginger Armbruster, Chief Privacy Officer and IT Division Director

 

Karen Habercoss, Chief Privacy Officer, UChicago Medicine

Track B


HARNESSING AI IN CYBERSECURITY: LESSONS FROM THE C-SUITE


IMRAN AHMAD

Partner, Canadian Head of Technology, Norton Rose Fulbright


RAY GRIFFIN

CISO and Head of Information Security, Cox Media Group


JOHN HORN

Director, Cybersecurity Practice, Datos Insights
AI’s rapid emergence across every aspect of business operations serves as both a
catalyst for growth and a vector for heightened risk.
Our panel of leading CISOs will offer an unfiltered glimpse into the strategic
deployment of AI by information security practitioners. These industry leaders
will share their direct experiences, focusing on the transformative role AI
plays in enhancing security measures, the challenges of integrating AI into
existing frameworks, and the innovative strategies developed to mitigate
associated risks. Attendees will leave with a comprehensive perspective on
strategic AI integration, including:
 
 * Real-world deployment: Delve into how top organizations have successfully
   integrated AI into their security operations, highlighting the
   decision-making processes, implementation strategies, and adjustments made to
   align AI initiatives with security goals.
 * Navigating challenges: Unpack the hurdles encountered by CISOs in adopting
   AI, from overcoming data bias and ensuring privacy to securing AI systems
   against adversarial attacks, and the practical solutions that were employed.
 * Mitigating risks: Gain actionable insights into the risk management practices
   refined through firsthand experiences, including the development of robust
   frameworks to assess and mitigate the unique risks posed by AI.
 * Adapting to an AI-driven security landscape: Learn from the foresight and
   adaptability of leading security practitioners as they prepare their
   organizations for the future, ensuring resilience against the evolving threat
   landscape influenced by AI.

Imran Ahmad, Partner, Canadian Head of Technology, Norton Rose Fulbright

Ray Griffin, CISO and Head of Information Security, Cox Media Group

John Horn, Director, Cybersecurity Practice, Datos Insights

3:00 PM - 3:15 PM ET


BILL FOSTER

U.S. Representative, Illinois 11th Congressional District


US REP. BILL FOSTER ON AI'S REGULATORY FUTURE

Join us for an exclusive session with U.S. Rep. Bill Foster, a distinguished
member of the Congressional Artificial Intelligence Task Force. In this session,
U.S. Rep. Foster will delve into the mission of the Congressional Task Force on
Artificial Intelligence, shedding light on its efforts to ensure America's
leadership in AI innovation while addressing crucial regulatory considerations.
Join us for a thought-provoking discussion that explores the intersection of
technology, governance, and the expanding use of artificial intelligence across
public and private sectors alike.
 
U.S. Rep. Foster will discuss:
 
 * How Congress, through bipartisan collaboration, is navigating the promises
   and complexities of AI’s transformative use cases;
 * The strategic initiatives outlined by the Task Force, including guiding
   principles and forward-looking recommendations;
 * Bipartisan policy proposals developed in consultation with key committees of
   jurisdiction.

Bill Foster, U.S. Representative, Illinois 11th Congressional District


EDITOR'S PANEL

3:15 PM ET - 3:25 PM ET


Track A


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track B


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track A


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track B


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track A


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track B


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track A


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track B


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?


CLOSING COMMENTS

3:00 pM et




ON DEMAND

THROUGH AUGUST 16TH





DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT

Register

#ISMGSummit



@ISMG_News





SPONSORS







THE SUMMIT EXPERIENCE

Previous
Next
Previous
Next


CPE CREDITS

ISMG Summits offer Continuing Education Credits. Learn informative and engaging
content created specifically for security professionals.

Claim Credits

Future Events


AUGUST 6, 2024

Cybercriminals Are Using AI - Are You?
See Event


AUGUST 8, 2024

Cybersecurity Summit: New Delhi
See Event


AUGUST 15, 2024

AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities
See Event


SEPTEMBER 17, 2024

Cybersecurity Summit: London
See Event


SEPTEMBER 26, 2024

Cybersecurity Summit: Canada East
See Event

Future Events


AUGUST 6, 2024

Cybercriminals Are Using AI - Are You?
See Event


AUGUST 8, 2024

Cybersecurity Summit: New Delhi
See Event


AUGUST 15, 2024

AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities
See Event