ismg.events Open in urlscan Pro
151.101.2.159  Public Scan

Submitted URL: http://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGSG7LFo_IIVMX90wIdyoH9AIcdT3ggpq4PU8qwJWfXu9Njq1tLIL-F561xHvg251luTnMmz_E=
Effective URL: https://ismg.events/summit/north-america-west-future-ai-2024/?utm_source=Marketo&utm_medium=AttorneyGeneral_HTML&utm...
Submission: On March 27 via api from TR — Scanned from DE

Form analysis 1 forms found in the DOM

Name: New FormPOST

<form class="elementor-form" method="post" name="New Form">
  <input type="hidden" name="post_id" value="5731">
  <input type="hidden" name="form_id" value="21b9e35">
  <input type="hidden" name="referer_title" value="Cybersecurity Implications of AI: North America West Summit">
  <input type="hidden" name="queried_id" value="15075">
  <div class="elementor-form-fields-wrapper elementor-labels-above">
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required">
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-sm  elementor-field-textual" placeholder="Email" required="required" aria-required="true">
    </div>
    <div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
      <div class="elementor-field" id="form-field-field_4cf4815">
        <div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-q6aohu1546fk" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&amp;co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&amp;hl=de&amp;type=v3&amp;v=moV1mTgQ6S91nuTnmll4Y9yf&amp;size=invisible&amp;badge=bottomright&amp;sa=Form&amp;cb=5fmhyney6nn6"></iframe>
            </div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </div>
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons">
      <button type="submit" class="elementor-button elementor-size-sm">
        <span>
          <span class=" elementor-button-icon">
          </span>
          <span class="elementor-button-text">Send</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

Skip to content
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About

Menu
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About


APRIL 16, 2024


CYBERSECURITY IMPLICATIONS OF AI SUMMIT: NORTH AMERICA WEST


9:00 AM PT - 5:00 PM PT

Register Now
View Agenda


Overview
Topics
Agenda
Speakers
CPE Credits
Register

Overview
Topics
Agenda
Speakers
CPE Credits
Register



EVENT OVERVIEW

Embark on a day of cutting-edge insights and strategic discussions at ISMG’s
Cybersecurity Implications of AI: North America West Summit.

This summit promises an exploration of the intricate and ever-evolving
relationship between artificial intelligence and cybersecurity. Join us for
conversations on the ethical landscape of AI in fraud prevention, securing Large
Language Models (LLMs) and understanding the implications for privacy,
compliance, and intellectual property.

Engage with top industry thought leaders and peers as they discuss collaboration
between human intelligence and AI, unveiling the transformative potential of
this dynamic synergy in bolstering cybersecurity defenses. From augmented
intelligence to AI-powered threat detection, CISOs will gain invaluable insights
into creating a resilient cybersecurity posture. The summit aims to empower
CISOs with a fundamental understanding of AI, risk mitigation strategies, and
the crucial importance of transparent governance frameworks. As a unique
interactive element, participants will engage in the Solution Room Workshop, a
tabletop exercise designed to apply the summit’s insights to real-world
scenarios. Join us for a day of thought-provoking discussions, practical
strategies, and collaborative exploration at the forefront of AI and
cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about
their participation. 





VENUE


MEYDENBAUER CENTER

11100 NE 6th St, Bellevue, WA 98004

NOTE:  All requests to attend will be reviewed by event staff and approved based
on professional qualifications and event capacity.




HIGHLIGHT TOPICS

 * Leveraging AI for Defense
 * Balancing Privacy and Compliance
 * Secure AI Integration
 * Combatting Threats with AI
 * Diverse Industry AI Applications

Register



DAVID TSAO

CISO, Instacart


ERIKA VOSS

Vice President, Information Security, DAT Freight & Analytics


ERIC SANCHEZ

CISO, Kyowa Kirin Pharmaceutical


JON WASHBURN

CISO, Stoel Rives


JERRY COCHRAN

Deputy CIO, Pacific Northwest National Labratory


BOB FERGUSON

Attorney General, Washington State


HEATHER WEST

Senior Director, Cybersecurity and Privacy Services, Venable


SEAN MURPHY

Senior Vice President and Chief Information Security Officer, BECU


SUHA CAN

CISO, Grammarly


NICOLE DARDEN FORD

CISO, Nordstrom


CHUCK MARKARIAN

CISO, PAACAR


GINGER ARMBRUSTER

Chief Privacy Officer and IT Division Director, City of Seattle


SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty




SAMPLE AGENDA

You can now view or download a PDF version of the attendee guide.

Download Agenda



REGISTRATION & BREAKFAST

8:00 am PT - 9:00 am PT

9:00 am – 9:40 aM PT


DAVID TSAO

CISO, Instacart


NICOLE DARDEN FORD

CISO, Nordstrom


SUHA CAN

CISO, Grammarly


HARNESSING AI IN CYBERSECURITY: LESSONS FROM THE C-SUITE

AI’s rapid emergence across every aspect of business operations serves as both a
catalyst for growth and a vector for heightened risk. Our keynote panel of
leading CISOs will offer an unfiltered glimpse into the strategic deployment of
artificial intelligence by information security practitioners.

These industry leaders will share their direct experiences, focusing on the
transformative role AI plays in enhancing security measures, the challenges of
integrating AI into existing frameworks, and the innovative strategies developed
to mitigate associated risks.

In this exclusive discussion, panelists will dissect specific instances where AI
technologies were leveraged to detect threats, streamline incident response, and
predict vulnerabilities within their organizations. The discussion will navigate
through the complexities of AI adoption, spotlighting the critical balance
between leveraging AI for its groundbreaking potential and addressing the
ethical, technical, and security challenges it introduces.
Attendees will leave with a comprehensive perspective on strategic AI
integration, including:

 * Real-World Deployment: Delve into how top organizations have successfully
   integrated AI into their security operations, highlighting the
   decision-making processes, implementation strategies, and adjustments made to
   align AI initiatives with security goals.
 * Navigating Challenges: Unpack the hurdles encountered by CISOs in adopting
   AI, from overcoming data bias and ensuring privacy to securing AI systems
   against adversarial attacks, and the practical solutions that were employed.
 * Mitigating Risks: Gain actionable insights into the risk management practices
   refined through firsthand experiences, including the development of robust
   frameworks to assess and mitigate the unique risks posed by AI.
 * Adapting to an AI-Driven Security Landscape: Learn from the foresight and
   adaptability of leading security practitioners as they prepare their
   organizations for the future, ensuring resilience against the evolving threat
   landscape influenced by AI.

 

Nicole Darden Ford, CISO, Nordstrom

David Tsao, CISO, Instacart

Suha Can, CISO, Grammarly

9:40am – 10:10 aM PT


GINGER ARMBRUSTER

Chief Privacy Officer and IT Division Director, City of Seattle


OJAS REJE

GM, Privacy and Data Governance Cloud, OneTrust


JERRY COCHRAN

Deputy CIO, Pacific Northwest National Laboratory


PRIVACY & COMPLIANCE IN THE AGE OF AI

Artificial Intelligence has emerged as an indelible and disruptive force in
information security, particularly in bolstering defensive capabilities through
sophisticated data analysis and pattern recognition.

As organizations harness the power of AI to fortify their cybersecurity posture,
a pivotal challenge emerges: striking the delicate balance between robust threat
prevention and the protection of individual and organizational privacy.

This session addresses the need to safeguard data privacy, along with the
governance and compliance considerations necessitated by the proliferation of AI
utilization. Beyond simply identifying challenges, this session serves as a
practical guide, offering actionable strategies for the ethical implementation
of AI in cybersecurity operations. Tailored for CISOs, IT professionals, data
scientists, and all stakeholders intrigued by the intricate interplay of AI,
ethics, and security, our discussion aims to shape a responsible and
privacy-conscious approach to AI deployment.

Key Discussion Points:

 * Privacy-Preserving AI Techniques: Explore cutting-edge techniques and
   technologies designed to enable the use of AI without compromising individual
   privacy, including federated learning, homomorphic encryption, and other
   approaches that allow AI models to be trained without accessing raw,
   sensitive data.
 * Consent and Data Governance: Examine the role of informed consent in the
   context of AI applications, best practices for transparently obtaining user
   consent, and strategies for effective data governance in compliance with
   evolving privacy regulations.
 * Accountability and Transparency in AI Practices: Discuss the importance of
   implementing accountability measures and ensuring transparency in AI
   operations to build trust and enable verification. Examine frameworks for
   auditing AI systems, the role of explainable AI in understanding
   decision-making processes, and policies for addressing biases and errors that
   impact privacy and data security.

Ginger Armbruster, Chief Privacy Officer and IT Division Director, City of
Seattle

Ojas Rege, GM, Privacy and Data Governance Cloud, OneTrust

Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory

10:10 am – 10:30 Am PT


BOB FERGUSON

Attorney General, Washington State


ARTIFICIAL INTELLIGENCE AND PUBLIC POLICY: ATTORNEY GENERAL BOB FERGUSON'S
VISION FOR WASHINGTON’S AI TASK FORCE

In this session, Attorney General Bob Ferguson will discuss the establishment of
the Artificial Intelligence Task Force in Washington, following the bipartisan
passage of Senate Bill 5838. Ferguson will outline the objectives and structure
of the task force, designed to assess the implications of AI technologies and
propose informed legislative recommendations.

Highlighting the task force’s mandate, he will delve into the critical areas of
public policy, high-risk applications, and the importance of maintaining racial
equity and civil liberties in the face of AI advancements. Ferguson’s talk will
also touch on the broader context of AI regulation and innovation, reflecting on
how the task force’s work aligns with national trends and addresses the unique
challenges and opportunities presented by AI technologies.

The session promises insightful perspectives on proactive governance and the
role of bipartisan collaboration in shaping the future of AI in Washington and
beyond.

Bob Ferguson, Attorney General, Washington State

10:30 am – 11:00 aM PT


KAYNE MCGLADREY

Field CISO, Hyperproof


THE TECHNICAL LANDSCAPE OF AI: EMPOWERING CISOS FOR SECURE IMPLEMENTATION

As the digital landscape continues to evolve, the integration of artificial
intelligence and machine-learning technologies into organizations' operations
has become increasingly prevalent. These transformative technologies hold great
potential for enhancing efficiency, automation and decision-making processes.
But with the tremendous benefits they offer, AI and ML also bring about unique
challenges and risks that demand the attention of chief information security
officers.

This session is designed specifically for CISOs seeking to fortify their
understanding of AI technologies and their implications on cybersecurity.

Key topics covered during the session will include:

 * Fundamentals of AI and ML: Understanding the core principles and algorithms
   behind AI and ML technologies, which enable CISOs to grasp the underlying
   mechanics behind AI-driven applications.
 * AI in Cybersecurity: Exploring the current landscape of AI applications in
   the realm of cybersecurity, including threat detection, anomaly
   identification and risk assessment, along with insights into the potential
   for AI-driven attacks.
 * Adversarial AI and Mitigation Strategies: Analyzing the concept of
   adversarial AI, its potential to subvert AI systems, and best practices for
   safeguarding AI algorithms from malicious attacks.
 * Explainable AI: Unraveling the black box nature of AI algorithms and methods
   to enhance transparency and interpretability, which are essential for
   building trust and gaining organizational buy-in.
 * AI Governance and Risk Management: Highlighting the significance of
   comprehensive AI governance frameworks and risk management strategies to
   mitigate potential AI-related risks effectively.
 * Collaborating With AI Teams: Strategies for fostering collaboration between
   CISOs and AI development teams, which facilitates a cohesive approach to
   security in AI projects.


NETWORKING & EXHIBITION BREAK

11:00 am PT - 11:25 am PT 


11:25 am – 11:55 am PT


JAKE GILLEN

Principal Solutions Architect, Expel


WIELDING THE DOUBLE-EDGED SWORD OF AI: BALANCING VALUE WITH INTRINSIC SECURITY
RISKS

With any new technology, adoption depends on tolerance for risk; and because
this is cybersecurity, that risk changes minute-to-minute. Artificial
Intelligence (AI) promises to enable defenders and adversaries alike—but
adversaries aren’t hindered by the associated risks.

Organizations are left balancing the benefits of new tech for keeping pace with
cyber threats, with the risk of the untested and unknown.

Jake Gillen, Principal Solutions Architect, Expel

11:55 am – 12:05 pm PT


TOM GUERRETTE

Cyber Security Engineer, Infoblox


GREG SIMMONS

Cyber Security Specialist, Infoblox


WHY DNS SHOULD BE YOUR SECURITY FOUNDATION

Learn about everything you can do with DNS but never considered. Every user,
server, IoT, and mobile device require DNS which can be leveraged to secure your
organization at the first intent to communicate.

Be first in the kill chain without relying on known signature based attacks,
analyzing sandboxed traffic, maintaining an army of security analysts, or being
vulnerable to misconfigured systems. Leverage advanced ML/AI models to block
connections to malicious domains, rendering malware, phishing, and lookalike
domains useless.

Tom Guerrette, Cyber Security Engineer, Infoblox

Greg Simmons, Cyber Security Specialist, Infoblox


12:05 pm – 12:50 pm PT


ERIC SANCHEZ

CISO, Kyowa Kirin, Inc., U.S.


JERRY COCHRAN

Deputy CIO, Pacific Northwest National Laboratory


CHUCK MARKARIAN

CISO, PAACAR


ADAM ZOLLER

CISO, Providence


TRANSFORMATIVE DEFENSE: UTILIZING AI TO COMBAT CYBER THREATS

The escalating sophistication of AI-driven cyberattacks necessitates a novel
approach in cybersecurity defense mechanisms.

Recent trends demonstrate adversaries utilizing AI for complex phishing
campaigns, leveraging deepfake technology for identity fraud, and automating
vulnerability exploitation. This session focuses on how security leaders can
utilize AI technologies to enhance defense capabilities, showcasing AI’s dual
potential as both a tool for attackers and a powerful ally in cybersecurity.

 
Key insights include leveraging machine learning for predictive threat
detection, employing AI-driven behavioral analytics to identify subtle anomalies
in network activity, and leverage emerging capabilities to improve system
robustness. The session aims to provide a strategic blueprint for integrating AI
into cybersecurity frameworks, thereby not only countering AI-exploited threats
but also setting a new standard for proactive defense.

 

Key Session Insights: 

 * Predictive Threat Detection: Implement the optimal AI strategy to forecast
   and neutralize threats before they manifest, drastically reducing the
   potential impact of cyberattacks.
 * Anomaly Detection through Behavioral Analytics: Utilize AI to monitor network
   behavior continuously, enabling the detection of deviations that signify
   potential security breaches, enhancing the speed and accuracy of response.
 * Collaborative Data Initiatives: An exploration of the significance of data
   sharing across organizational boundaries, emphasizing the collective strength
   derived from collaborative defense efforts.

 
This session will empower cybersecurity professionals with actionable strategies
for leveraging AI to build more resilient and adaptive security infrastructures,
ensuring preparedness against the ever-evolving landscape of AI-exploited cyber
threats.

Jerry Cochran, Deputy CIO, Pacific Northwest National Laboratory

Chuck Markarian, CISO, PAACAR

Eric Sanchez, CISO, Kyowa Kirin, Inc.- U.S.

Adam Zoller, CISO, Providence


LUNCH & EXHIBITION

12:50 PM pt - 1:40 PM pt


1:40 pm – 2:10 pM PT


HEATHER WEST

Senior Director, Cybersecurity and Privacy Services, Venable


JON WASHBURN

CISO, Stoel Rives


NATHAN SHAFFER

Partner; Intellectual Property Litigator, Orrick Herrington & Sutcliffe


STRATEGIC FRAMEWORKS FOR SECURE AI DEPLOYMENT: INTEGRATING AIBOMS FOR ENHANCED
TRUST AND VERIFICATION

As AI becomes integral to operational strategies, the imperative for secure,
trustworthy, and verifiable AI deployment intensifies.

This session addresses the complexities of deploying AI models securely,
emphasizing the critical role of Artificial Intelligence Bills of Materials
(AIBOMs) in ensuring security, trust, and accuracy.

AIBOMs provide a detailed inventory of components, data sets, and environments
involved in AI model development, crucial for oversight and control, especially
for third-party AI applications. Unlike Software Bills of Materials (SBOMs),
AIBOMs include data lineage, model training parameters, and ethical
considerations, offering a comprehensive view essential for maintaining
transparency and trust.

This exploration into AIBOMs will highlight their importance in an
organization’s security posture, detailing practical steps for AI due diligence
and third-party AI platform evaluation. The discussion aims to build trust in AI
through a focus on technological robustness and the continuous assurance of
model accuracy and ethical deployment.

Key Session Insights:

 * Understanding AIBOMs vs. SBOMs: Grasp the differences and the criticality of
   AIBOMs for a transparent, controlled AI deployment.
 * Building Trust in AI Systems: Explore validation methods for AI system
   integrity and security, ensuring alignment with organizational values and
   stakeholder trust.
 * AI Due Diligence Checklist: A guide for information security leaders to
   rigorously assess AI vendors, with a focus on security, accuracy, and ethical
   considerations.

Heather West, Senior Director, Cybersecurity and Privacy Services, Venable

Jon Washburn, CISO, Stoel Rives

Nathan Shaffer, Partner; Intellectual Property Litigator, Orrick Herrington &
Sutcliffe

2:10 pm – 3:20 pM PT


NADER ZAVERI

Senior Manager - Incident Response & Remediation, Mandiant


JERRY COCHRAN

Deputy CIO, Pacific Northwest National Laboratory


U.S SECRET SERVICE


DEEP FAKES, REAL STAKES: UNMASKING CYBER DECEPTION IN A HIGH-STAKES TABLETOP
SIMULATION

Join us for this collaborative tabletop exercise, hosted jointly by the United
States Secret Service and CyberEdBoard. This interactive session is meticulously
crafted to mimic a sophisticated cyber-attack. It aims to bolster strategic
response capabilities and enhance operational readiness against the backdrop of
advanced cyber threats. The focal point of this exercise is a strategically
crafted deep fake incident targeting a corporate executive, weaving together
elements of social engineering, financial fraud, and the challenges posed by
emerging technological threats.

What You Will Gain From This Experience

 * Enhanced Organizational Readiness: To critically assess and improve
   organizational preparedness in responding to intricate cyber incidents
   involving deep fake technology and social engineering.
 * Interagency Collaboration and Knowledge Exchange: To strengthen the
   partnership and information sharing between the Secret Service and leaders in
   the private sector cybersecurity community.
 * Strategic Response Development: To create all-encompassing incident response
   strategies that cover legal, technical, and communicational facets, while
   also identifying and rectifying weaknesses in existing cybersecurity policies
   and governance.


NETWORKING & EXHIBITION BREAK

3:20 pm pT – 3:40 pM pt


3:40 pm – 4:10 pm PT


VINIT TOPLE

Fmr. Head of Gen AI Product Portfolio, Alexa Automotive, Amazon


HEATHER WEST

Senior Director, Cybersecurity and Privacy Services, Venable


NAVIGATING THE MAZE: OPEN PLATFORMS VS. OPEN SOURCE IN LLM SECURITY  

With the rapidly advancing applications for Large Language Models (LLMs), the
distinction between open platforms and open-source initiatives presents a
critical juncture for security. This session dives into the nuanced security
implications of utilizing proprietary services from third parties compared to
engaging with open-source LLM projects.

With the backdrop of recent inquiries by entities like the NTIA into the risks
and benefits of publicly available model weights, our discussion is timely and
essential for information security leaders.

As organizations navigate the decision between open platforms and open-source
models, understanding the unique security challenges and opportunities each
presents is paramount. This session aims to demystify these distinctions,
providing CISOs, CIOs, and VPs of Information Security with a clear roadmap for
assessing and integrating LLM technologies securely into their operations.

Key Takeaways:

 * Comprehensive Risk Analysis: Learn to conduct a thorough security assessment
   for both open platforms and open-source LLMs, highlighting key
   vulnerabilities and mitigation strategies.
 * Strategic Implementation Guidance: Gain insights into best practices for
   safely implementing LLM solutions, whether they are sourced from open
   platforms or open-source communities, ensuring robust security postures
   without sacrificing innovation.
 * Regulatory and Compliance Considerations: Understand the evolving regulatory
   landscape affecting LLM deployments, including how to navigate compliance
   while leveraging public model weights and contributing to open-source
   projects.

Heather West, Senior Director, Cybersecurity and Privacy Services, Venable

Vinit Tople, Fmr. Head of Gen AI Product Portfolio, Alexa Automotive, Amazon

4:10 pm – 4:40 pM PT


JON WASHBURN

CISO, Stoel Rives


ERIKA VOSS

Vice President, Information Security, DAT Freight & Analytics


ERIC SANCHEZ

CISO, Kyowa Kirin, Inc. - U.S.


SEAN MURPHY

SVP, CISO, Boeing Employees Credit Union


BEYOND SILOS: AI ADOPTION ACROSS INDUSTRIES 

AI adoption has varied across industries, with different sectors serving as
laboratories of innovation in their approach. From financial services and
healthcare to legal, manufacturing, and logistics, each sector faces unique
challenges in leveraging AI for operational efficiency and security enhancement
in their respective domains.

In this open and candid discussion, esteemed information security leaders from
diverse fields will offer a panoramic view of AI’s impact across the business
spectrum. Participants will benefit from an in-depth exploration of how
different industries are not only utilizing AI but also navigating the
complexities of its adoption, with a special focus on the lessons learned in the
process.

Our closing panel will unveil the nuances of AI integration within their
sectors, shedding light on how AI technologies have been implemented to optimize
operations, enhance customer experiences, and bolster security postures against
increasingly sophisticated threats. More importantly, this session aims to
distill the collective experiences of these industry leaders into actionable
insights, highlighting the common hurdles encountered during AI adoption, from
ethical dilemmas and regulatory challenges to technical obstacles and workforce
implications.

Key Session Insights:

 * Industry-Specific Insight: Learn how different industries are leveraging AI
   for both operational excellence and enhanced security, highlighting
   innovative uses and strategic deployments.
 * Common Challenges and Solutions: A comprehensive look at shared difficulties,
   including data privacy concerns, algorithm bias, and the integration with
   legacy systems, alongside the strategies developed to overcome them.
 * Critical Lessons Learned: Valuable takeaways from each industry’s experience
   with AI, offering a roadmap of best practices, cautionary tales, and
   innovative solutions that have emerged from real-world applications.
 * Forward-Looking Strategies: Gain perspective on future developments of AI in
   each sector, considering future applications, potential disruptions, and the
   ongoing need for cross-industry collaboration and learning.

Jon Washburn, CISO, Stoel Rives

Erika Voss, Vice President, Information Security, DAT Freight & Analytics

Eric Sanchez, CISO, Kyowa Kirin, Inc.- U.S.

Sean Murphy, SVP, CISO, Boeing Employees Credit Union


CLOSING COMMENTS

4:40 pm – 4:50 PM pt




REGISTER

RSVP here to attend our events. You can select for multiple or individual
tickets. 

NOTE:  All requests to attend will be reviewed by event staff and approved based
on professional qualifications and event capacity.




CYBERSECURITY IMPLICATIONS OF AI SUMMIT: NORTH AMERICA WEST

Apr 16 - 17, 2024

RSVP

Available till Apr 16, 2024 (04:28 AM)

Add
Please enter your email to continue


I agree to the Terms and Conditions and Privacy Policy.

Proceed



SPONSORS





Upcoming ISMG Events


MAY 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your
Organization's Resilience
See Event


APRIL 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit
See Event


APRIL 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration
See Event


JUNE 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru
See Event


APRIL 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and
Healthcare
See Event


EVENT

 * Summits
 * Engage
 * Roundtables
 * Custom Events

 * Summits
 * Engage
 * Roundtables
 * Custom Events


ABOUT

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy



@ISMG_News #ISMGEngage




SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS

Send