ismg.events
Open in
urlscan Pro
151.101.2.159
Public Scan
Submitted URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGUs2POv89GV5NzqJ2Y7shuLCehBtEHIW49EceDtdCg2rSuF-RQ6uXNHGlCr12ZbDpDMxUhMrI=
Effective URL: https://ismg.events/summit/virtual-cybersecurity-2024/?utm_source=Marketo&utm_medium=FullAgenda_HTML&utm_campaign=En...
Submission: On August 05 via api from TR — Scanned from DE
Effective URL: https://ismg.events/summit/virtual-cybersecurity-2024/?utm_source=Marketo&utm_medium=FullAgenda_HTML&utm_campaign=En...
Submission: On August 05 via api from TR — Scanned from DE
Form analysis
0 forms found in the DOMText Content
AUGUST 15, 2024 AI'S DOUBLE-EDGED SWORD: NAVIGATING RISKS WHILE UNLOCKING OPPORTUNITIES 10:00 AM ET - 3:00 PM ET | VIRTUAL EVENT Register Now ON DEMAND AUGUST 16, 2024 Overview Topics Agenda Speakers CPE Credits Register Overview Topics Agenda Speakers CPE Credits Register EVENT OVERVIEW The Virtual AI Summit by ISMG delves into a dynamic exploration of the intersection between AI and cybersecurity. Take a deep dive into ethical considerations, LLM security, and the intricate impacts on privacy and intellectual property. Engage directly with industry leaders to uncover the synergy between human intelligence and AI in fortifying cybersecurity, with a special focus on AI-driven threat detection and risk management strategies. This summit equips security professionals with vital AI insights, promoting transparent governance and hands-on application through sessions dedicated to real-world cybersecurity challenges. Expect a day packed with strategic dialogues, invaluable insights, and collaborative exploration at the forefront of AI and cybersecurity. View our ISMG Event Experience video to see what your peers are saying about their participation. Download our Summit Brochure HIGHLIGHT TOPICS * Leveraging AI for Defense * Balancing Privacy and Compliance * Secure AI Integration * Combating Threats With AI * Diverse Industry AI Applications Register ROBERT COSTELLO Chief Information Officer, CISA KAREN HABERCOSS Chief Privacy Officer, UChicago Medicine GINGER ARMBRUSTER Chief Privacy Officer and IT Division Director, City of Seattle, WA TYLER MADDRY Partner, Hunton Andrews Kurth LLP LISA SOTTO Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP KENNETH TOWNSEND CISO, Ingredion E.P. MATHEW Deputy CIO, Defense Intelligence Agency IMRAN AHMAD Partner/Canadian Head of Technology, Norton Rose Fulbright JOHN HORN Director, Cybersecurity Practice, Datos Insights HEATHER WEST Senior Director, Cybersecurity and Privacy Services, Venable ANAHI SANTIAGO CISO, ChristianaCare RAY GRIFFIN CISO and Head of Information Security, Cox Media Group SPEAKERS THOUGHT LEADERS ON STAGE LEADING DEEP-DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats. View Faculty OPENING REMARKS 9:55 am et - 10:00 am et 10:00 am - 10:30 am ROBERT COSTELLO Chief Information Officer, CISA A ROAD MAP FOR NEW TERRAIN: STRATEGIC INSIGHTS FROM CISA'S CIO ROBERT COSTELLO Join us for an insightful keynote fireside chat with Robert Costello, chief information officer of CISA, as he discusses the dynamic intersection of artificial intelligence and cybersecurity. This session will cover the pivotal work CISA is doing to integrate AI in bolstering cyber defenses, including their recently developed AI road map. Costello will share insight from CISA’s strategic action plan, which focuses on responsible AI use, securing AI systems and mitigating AI-related threats to critical infrastructure. Additionally, the discussion will highlight the evolving cyber risks and how AI can be leveraged to enhance national security. Attendees will also learn how their organizations can utilize AI to enhance their cybersecurity posture, with insights into CISA’s available resources and collaborative opportunities. This is a unique opportunity for information security practitioners in government to gain valuable insights from one of the leading voices in the field. Key takeaways: * Detailed understanding of CISA’s AI road map: Learn the specific steps and timelines in CISA’s comprehensive plan for integrating AI into national cybersecurity efforts, including key initiatives and expected outcomes. * Best Practices for secure AI system development: Gain in-depth knowledge of CISA’s guidelines for secure AI system development, including specific risk mitigation techniques, compliance requirements, and examples of successful implementation. * Advanced strategies to protect critical infrastructure: Discover CISA’s latest strategies for using AI to defend against sophisticated threats targeting critical infrastructure, with real-world examples, actionable recommendations, and insights into collaboration with international partners and private sector stakeholders. * Leveraging AI for enhanced cybersecurity: Explore how organizations can implement AI to improve their cybersecurity posture, utilizing resources and guidance from CISA to stay ahead of emerging threats and enhance overall cyber resilience. Robert Costello, Chief Information Officer, CISA 10:30 AM - 11:00 AM SHAKED ROTLEVI Technical Product Marketing Manager, Wiz ACCELERATE AI INNOVATION SECURELY WITH AI-SPM As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it important for cloud security strategies to advance accordingly. Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely. Shaked Rotlevi, Technical Product Marketing Manager, Wiz 11:00 am - 11:30 am TIM GALLO Head of Global Solutions Architects, Google AN IN DEPTH LOOK AT AI & THE EVOLVING CYBER THREAT LANDSCAPE In the rapidly evolving landscape of cyber warfare, understanding and responding to the latest threats is crucial. This session offers unparalleled insights tailored to the frontline incident response and threat intelligence experts who tackle high-impact cyberattacks daily. We will cover the current threat landscape, evolutions in the attack surface, the role of AI in cybersecurity, advancements and shortcomings in defenses, and how Google Cloud is helping to bridge critical security gaps. Join us to equip yourself with the knowledge and strategies needed to navigate the complexities of modern cyber threats. Key discussion points: * Current Threat Landscape: Identifying the most significant attacks and attackers impacting organizations today. Understand the prevalent and dangerous cyber threats that enterprises face. * Evolving Attack Surface: Assessing how the attack surface has changed over the past year and the implications for security strategies. Explore how digital transformation and remote work have expanded vulnerabilities. * AI in Cybersecurity: Exploring the dual role of AI in both facilitating cyber attacks and bolstering cybersecurity defenses. Discuss how AI is used by adversaries and defenders alike. * Defensive Adaptations: Reviewing the advancements and shortcomings in security defenses over the past year. Highlight effective measures, existing gaps, and innovative solutions. Tim Gallo, Head of Global Solutions Architects, Google 12:00 pm - 12:30 pm LIQUIAN LIM Senior Product Marketing Manager, Snyk BUILDING TOMORROW SECURELY... SECURING THE USE OF AI IN APP DEVELOPMENT Join Liqian Lim, Senior Product Marketing Manager, AI/ML at Snyk, a developer security platform for application security, as she talks about how organisations can build tomorrow with AI – securely. In this session, we will cover: * The importance of AI-fitness and wellness. * The risks of not being secure before adoption. * Surprising survey results on organisational AI readiness. * Foundational steps to building an AI. protection strategy for your SDLC. * Key features to look out for in your chosen protection. Liquian Lim, Senior Product Marketing Manager, Snyk 1:00 pm - 1:15 pm JASON COOK AVP Worldwide Partner Sales Engineering, Rubrik AI-DRIVEN CYBER INVESTIGATIONS Dealing with the barrage of cyber incidents, knowing when to sound the alarm, how to react, what to investigate, and how to recover are no easy feats for IT and security teams. Couple this with the complexity of navigating your own unique data estate and infrastructure and the constantly evolving nature of attacks. Making mistakes can cost millions along with irreparable brand damage. And if we are talking about critical infrastructure impacted by cyberattacks, such as healthcare and public utilities, human lives could be at stake. Cook will discuss how IT and security teams, at all levels of cyber expertise, can leverage AI to accelerate cyber investigation and recovery. Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik 1:15 pm - 2:00 pm LISA SOTTO Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP TYLER MADDRY Partner, Hunton Andrews Kurth LLP IP AND PRIVACY LAW ISSUES IN GENERATIVE AI FOR CYBER LEADERS As gen AI becomes an integral tool in cybersecurity, it brings transformative potential alongside intricate legal challenges. This session, tailored for experienced cybersecurity practitioners, will delve into the critical legal issues surrounding gen AI. The session will provide an overview of the latest gen AI technologies and their implications. It will explore intellectual property law issues, including potential legal risks, IP litigation, indemnification, and practical legal recommendations. Additionally, it will address privacy and cybersecurity law, emphasizing the importance of these principles and the unique risks posed by gen AI. Attendees will gain insights into the U.S. regulatory landscape and the EU AI Act, essential legal considerations for maintaining privacy and cybersecurity, and best practices for AI governance. This comprehensive session aims to equip cybersecurity practitioners with the knowledge and strategies needed to navigate the evolving legal landscape of gen AI effectively. Key takeaways: * Understand the latest gen AI technologies and their impact on cybersecurity; * Identify and mitigate IP risks associated with AI; * Navigate the complex regulatory landscapes of privacy and cybersecurity law; * Implement AI governance practices to ensure ethical and compliant use of AI. Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP Tyler Maddry, Partner, Hunton Andrews Kurth LLP 2:00 PM - 2:30 PM Track A SECURING THE ROAD: WHY VULNERABILITIES IN ELECTRIC LOGGING DEVICES ARE EVERYONE'S PROBLEM PEEYUSH PATEL CISO, XPO JEREMY DAILY Associate Professor, Colorado State University As cyberthreat actors adapt and enhance their methods, the vulnerabilities in electronic logging devices (ELDs) used in over 14 million medium- and heavy-duty commercial trucks in the United States serve as a stark reminder of the widespread impact of insecure IoT systems. This session, tailored for CISOs and cybersecurity leaders across various industries, will provide crucial insights into these vulnerabilities. While the primary focus is on transportation, the speakers’ insights into IoT vulnerabilities, wireless network security, and firmware integrity will be applicable to many sectors, including manufacturing, healthcare, finance, and critical infrastructure. Learn how ELDs, mandated to track driving hours and log critical vehicle data, can be exploited via Bluetooth or Wi-Fi connections, leading to unauthorized control, data manipulation, and malware propagation. These insights are not just crucial for the transportation sector but resonate across all industries reliant on interconnected and IoT systems. The final vulnerability, and perhaps the most concerning, is the potential for a self-propagating truck-to-truck worm, which takes advantage of the inherent networked nature of these devices. Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications. Key takeaways: * Understanding the parallels between ELD vulnerabilities and broader IoT security challenges affecting various industries; * Practical measures to safeguard interconnected systems and prevent widespread operational disruptions; * The importance of cross-industry collaboration in tackling emerging cybersecurity threats. Peeyush Patel, CISO, XPO Jeremy Daily, Associate Professor, Colorado State University Track B AI IN HEALTHCARE: ADDRESSING BIAS AND SECURITY RISKS HEATHER WEST Senior Director, Cybersecurity and Privacy Services, Venable DAVID ANDERSON Vice President, Cyber, Woodruff Sawyer ANAHI SANTIAGO CISO, ChristianaCare ALEX VITRUK Senior Associate Attorney, BakerHostetler AI holds immense promise in revolutionizing healthcare, from fast-tracking research and development to providing earlier diagnoses to personalized treatment plans. However, as AI algorithms increasingly influence medical decision-making, concerns about bias and discrimination have become more apparent. These biases can arise from inherent issues in AI datasets, algorithmic design, and implementation, potentially perpetuating disparities in healthcare delivery and outcomes. This session will delve into the ethical, legal, and security implications of healthcare discrimination facilitated by AI, including the erosion of trust, patient harm, and legal challenges. We will explore how AI’s blind spots can inadvertently reinforce existing biases and how representative datasets can help mitigate these challenges. Join us to examine the following key areas: * Biases in AI datasets: Understand how biases in training data can lead to unequal healthcare outcomes and discuss the importance of using diverse and representative datasets. * Algorithmic design, implementation and security: Analyze how design choices and system vulnerabilities can influence the fairness and safety of AI applications. * Mitigation and protection strategies: Discuss effective strategies to mitigate bias in AI healthcare applications, emphasizing the need for ongoing oversight, ethical standards, and robust security measures to ensure equitable and ethical use of AI in healthcare. Heather West, Senior Director, Cybersecurity and Privacy Services, Venable David Anderson, Vice President, Cyber, Woodruff Sawyer Anahi Santiago, CISO, ChristianaCare Alex Vitruk, Senior Associate Attorney, BakerHostetler 2:30 pm - 3:00 pm Track A PRIVACY & COMPLIANCE IN THE AGE OF AI GINGER ARMBRUSTER Chief Privacy Officer and IT Division Director, City of Seattle, Washington KAREN HABERCOSS Chief Privacy Officer, UChicago Medicine Artificial intelligence has emerged as an indelible and disruptive force in information security, particularly in bolstering defensive capabilities through sophisticated data analysis and pattern recognition. As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy. This session will address the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session will serve as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations. Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, the discussion aims to shape a responsible and privacy-conscious approach to AI deployment. Key discussion points: * Privacy-preserving AI techniques: Explore cutting-edge techniques and technologies designed to enable the use of AI without compromising individual privacy, including federated learning, homomorphic encryption, and other approaches that allow AI models to be trained without accessing raw, sensitive data. * Consent and data governance: Examine the role of informed consent in the context of AI applications, best practices for transparently obtaining user consent, and strategies for effective data governance in compliance with evolving privacy regulations. * Accountability and transparency in AI practices: Discuss the importance of implementing accountability measures and ensuring transparency in AI operations to build trust and enable verification. Examine frameworks for auditing AI systems, the role of explainable AI in understanding decision-making processes, and policies for addressing biases and errors that impact privacy and data security. Ginger Armbruster, Chief Privacy Officer and IT Division Director Karen Habercoss, Chief Privacy Officer, UChicago Medicine Track B HARNESSING AI IN CYBERSECURITY: LESSONS FROM THE C-SUITE IMRAN AHMAD Partner, Canadian Head of Technology, Norton Rose Fulbright RAY GRIFFIN CISO and Head of Information Security, Cox Media Group JOHN HORN Director, Cybersecurity Practice, Datos Insights AI’s rapid emergence across every aspect of business operations serves as both a catalyst for growth and a vector for heightened risk. Our panel of leading CISOs will offer an unfiltered glimpse into the strategic deployment of AI by information security practitioners. These industry leaders will share their direct experiences, focusing on the transformative role AI plays in enhancing security measures, the challenges of integrating AI into existing frameworks, and the innovative strategies developed to mitigate associated risks. Attendees will leave with a comprehensive perspective on strategic AI integration, including: * Real-world deployment: Delve into how top organizations have successfully integrated AI into their security operations, highlighting the decision-making processes, implementation strategies, and adjustments made to align AI initiatives with security goals. * Navigating challenges: Unpack the hurdles encountered by CISOs in adopting AI, from overcoming data bias and ensuring privacy to securing AI systems against adversarial attacks, and the practical solutions that were employed. * Mitigating risks: Gain actionable insights into the risk management practices refined through firsthand experiences, including the development of robust frameworks to assess and mitigate the unique risks posed by AI. * Adapting to an AI-driven security landscape: Learn from the foresight and adaptability of leading security practitioners as they prepare their organizations for the future, ensuring resilience against the evolving threat landscape influenced by AI. Imran Ahmad, Partner, Canadian Head of Technology, Norton Rose Fulbright Ray Griffin, CISO and Head of Information Security, Cox Media Group John Horn, Director, Cybersecurity Practice, Datos Insights 3:00 PM - 3:15 PM ET BILL FOSTER U.S. Representative, Illinois 11th Congressional District US REP. BILL FOSTER ON AI'S REGULATORY FUTURE Join us for an exclusive session with U.S. Rep. Bill Foster, a distinguished member of the Congressional Artificial Intelligence Task Force. In this session, U.S. Rep. Foster will delve into the mission of the Congressional Task Force on Artificial Intelligence, shedding light on its efforts to ensure America's leadership in AI innovation while addressing crucial regulatory considerations. Join us for a thought-provoking discussion that explores the intersection of technology, governance, and the expanding use of artificial intelligence across public and private sectors alike. U.S. Rep. Foster will discuss: * How Congress, through bipartisan collaboration, is navigating the promises and complexities of AI’s transformative use cases; * The strategic initiatives outlined by the Task Force, including guiding principles and forward-looking recommendations; * Bipartisan policy proposals developed in consultation with key committees of jurisdiction. Bill Foster, U.S. Representative, Illinois 11th Congressional District EDITOR'S PANEL 3:15 PM ET - 3:25 PM ET Track A ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track B ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track A ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track B ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track A ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track B ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track A ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? Track B ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE In this dynamic keynote panel, our experts will explore the key differences between the modern and traditional CISO. They will take a deep dive into the absolute must-have skills and experiences that today’s CISOs need to succeed, in a landscape where business risk and security decisions are more closely intertwined than ever before. You will also gain invaluable insights into: * API security: If ‘API is the new endpoint,’ how do we get a handle on inventory, vulnerabilities and defense? * Third-Party Risk: What happens when your greatest vulnerabilities are through the doors of your most strategic service providers? * ChatGPT: What are the potential use cases for the defender as well as the adversary? CLOSING COMMENTS 3:00 pM et ON DEMAND THROUGH AUGUST 16TH DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT Register #ISMGSummit @ISMG_News SPONSORS THE SUMMIT EXPERIENCE Previous Next Previous Next CPE CREDITS ISMG Summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals. Claim Credits Future Events AUGUST 6, 2024 Cybercriminals Are Using AI - Are You? See Event AUGUST 8, 2024 Cybersecurity Summit: New Delhi See Event AUGUST 15, 2024 AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities See Event SEPTEMBER 17, 2024 Cybersecurity Summit: London See Event SEPTEMBER 26, 2024 Cybersecurity Summit: Canada East See Event Future Events AUGUST 6, 2024 Cybercriminals Are Using AI - Are You? See Event AUGUST 8, 2024 Cybersecurity Summit: New Delhi See Event AUGUST 15, 2024 AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities See Event