ismg.events Open in urlscan Pro
151.101.2.159  Public Scan

URL: https://ismg.events/summit/virtual-cybersecurity-2024/?utm_source=Marketo&utm_medium=SavetheDate_HTML&utm_campaign=E...
Submission: On July 11 via api from IN — Scanned from US

Form analysis 1 forms found in the DOM

Name: Subscribe-FooterPOST

<form class="elementor-form" method="post" name="Subscribe-Footer">
  <input type="hidden" name="post_id" value="5731">
  <input type="hidden" name="form_id" value="21b9e35">
  <input type="hidden" name="referer_title" value="Virtual Cybersecurity Summit">
  <input type="hidden" name="queried_id" value="15138">
  <div class="elementor-form-fields-wrapper elementor-labels-above">
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-75 elementor-field-required">
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-xs  elementor-field-textual" placeholder="Email" required="required" aria-required="true">
    </div>
    <div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
      <div class="elementor-field" id="form-field-field_4cf4815">
        <div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-6zyb9r7jq22" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&amp;co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&amp;hl=en&amp;type=v3&amp;v=rKbTvxTxwcw5VqzrtN-ICwWt&amp;size=invisible&amp;badge=bottomright&amp;sa=Form&amp;cb=9o92kf2kdmy5"></iframe>
            </div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </div>
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-40 e-form__buttons">
      <button type="submit" class="elementor-button elementor-size-sm">
        <span>
          <span class=" elementor-button-icon">
          </span>
          <span class="elementor-button-text">Send</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

Skip to content
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About

Menu
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About


AUGUST 15, 2024


AI'S DOUBLE-EDGED SWORD: NAVIGATING RISKS WHILE UNLOCKING OPPORTUNITIES


10:00 AM ET - 3:00 PM ET


VIRTUAL EVENT

Register Now
View Agenda


Overview
Topics
Agenda
Speakers
CPE Credits
Register

Overview
Topics
Agenda
Speakers
CPE Credits
Register



EVENT OVERVIEW

The Virtual AI Summit by ISMG delves into a dynamic exploration of the
intersection between AI and cybersecurity. Take a deep dive into ethical
considerations, LLM security, and the intricate impacts on privacy and
intellectual property. Engage directly with industry leaders to uncover the
synergy between human intelligence and AI in fortifying cybersecurity, with a
special focus on AI-driven threat detection and risk management strategies. This
summit equips security professionals with vital AI insights, promoting
transparent governance and hands-on application through sessions dedicated to
real-world cybersecurity challenges. Expect a day packed with strategic
dialogues, invaluable insights, and collaborative exploration at the forefront
of AI and cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about
their participation. 

Download our Summit Brochure




VENUE


VIRTUAL

NOTE: All requests to attend will be reviewed by event staff and approved based
on professional qualifications and event capacity.



HIGHLIGHT TOPICS

 * Leveraging AI for Defense
 * Balancing Privacy and Compliance
 * Secure AI Integration
 * Combatting Threats With AI
 * Diverse Industry AI Applications

Register



SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty




ROBERT COSTELLO

CIO, CISA


KAREN HABERCROSS

Chief Privacy Officer, UChicago Medicine


GINGER ARMBRUSTER

Chief Privacy Officer and IT Division Director, City of Seattle, WA


TYLER MADDRY

Partner, Hunton Andrews Kurth LLP


LISA SOTTO

Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews
Kurth LLP


ERIC SANCHEZ

CISO, Kyowa Kirin Pharmaceutical


E.P. MATHEW

Deputy CIO, Defense Intelligence Agency


IMRAN AHMAD

Partner/Canadian Head of Technology, Norton Rose Fulbright


JOHN HORN

Head of Cybersecurity Practice, Datos Insights


HEATHER WEST

Senior Director, Cybersecurity and Privacy Services, Venable LLP


ANAHI SANTIAGO

CISO, National General, ChristianaCare


RAY GRIFFIN

CISO and Head of Information Security, Cox Media Group


SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty



You can now view or download a PDF version of the attendee guide.

Download Agenda



OPENING REMARKS

9:00 am et - 9:15 am et


You can now view or download a PDF version of the attendee guide.

Download Agenda

9:00 am et - 9:15 am et

10:00 am - 10:30 am


ROBERT COSTELLO

Chief Information Officer, CISA


A ROADMAP FOR NEW TERRAIN: STRATEGIC INSIGHTS FROM CISA'S CIO ROBERT COSTELLO

Join us for an insightful keynote fireside chat with Robert Costello, Chief
Information Officer of CISA, as he discusses the dynamic intersection of
Artificial Intelligence and cybersecurity. This session will cover the pivotal
work of CISA is doing to integrate AI in bolstering cyber defenses, including
their recently developed AI Roadmap.

Costello will share insight from CISA’s strategic action plan, which focuses on
responsible AI use, securing AI systems, and mitigating AI-related threats to
critical infrastructure. Additionally, the discussion will highlight the
evolving cyber risks and how AI can be leveraged to enhance national security.
Attendees will also learn how thier organizations can utilize AI to enhance
their cybersecurity posture, with insights into CISA’s available resources and
collaborative opportunities. This is a unique opportunity for information
security practitioners in government to gain valuable insights from one of the
leading voices in the field.

Key Takeaways:

 * Detailed Understanding of CISA’s AI Roadmap: Learn the specific steps and
   timelines in CISA’s comprehensive plan for integrating AI into national
   cybersecurity efforts, including key initiatives and expected outcomes. 
 * Best Practices for Secure AI System Development: Gain in-depth knowledge of
   CISA’s guidelines for secure AI system development, including specific risk
   mitigation techniques, compliance requirements, and examples of successful
   implementation. 
 * Advanced Strategies to Protect Critical Infrastructure: Discover CISA’s
   latest strategies for using AI to defend against sophisticated threats
   targeting critical infrastructure, with real-world examples, actionable
   recommendations, and insights into collaboration with international partners
   and private sector stakeholders. 
 * Leveraging AI for Enhanced Cybersecurity: Explore how organizations can
   implement AI to improve their cybersecurity posture, utilizing resources and
   guidance from CISA to stay ahead of emerging threats and enhance overall
   cyber resilience. 

Robert Costello, Chief Information Officer, CISA

10:30 AM - 11:00 AM


VIRTUAL CYBERSECURITY SUMMIT




CLOUD SECURITY MATURITY AND THE NEED FOR PROACTIVE AND REACTIVE APPROACHES

Enterprises of all sizes are moving to the cloud or expanding their footprint,
and cloud environments are becoming more complex.

Security leaders are constantly trying to improve their overall security
posture. Some primarily focus on reducing risk, and others maintain a
detection-first mindset. So, what is the right approach?

The answer is both. But which approach should be the focus today depends on the
enterprise’s security maturity.

In this session, we will discuss:

 * What cloud security maturity is and the path to achieving it;
 * Creating an effective security backstop with cloud detection and response;
 * How reactive security should be an enabler for proactive security.

Shashank Golla, Product Marketing Manager, Wiz

11:00 am - 11:30 am


GINGER ARMBRUSTER

Chief Privacy Officer and IT Division Director, City of Seattle, Washington


KAREN HABERCROSS

Chief Privacy Officer, UChicago Medicine


PRIVACY & COMPLIANCE IN THE AGE OF AI

Artificial Intelligence has emerged as an indelible and disruptive force in
information security, particularly in bolstering defensive capabilities through
sophisticated data analysis and pattern recognition.

As organizations harness the power of AI to fortify their cybersecurity posture,
a pivotal challenge emerges: striking the delicate balance between robust threat
prevention and the protection of individual and organizational privacy.

This session addresses the need to safeguard data privacy, along with the
governance and compliance considerations necessitated by the proliferation of AI
utilization. Beyond simply identifying challenges, this session serves as a
practical guide, offering actionable strategies for the ethical implementation
of

AI in cybersecurity operations. Tailored for CISOs, IT professionals, data
scientists, and all stakeholders intrigued by the intricate interplay of AI,
ethics, and security, our discussion aims to shape a responsible and
privacy-conscious approach to AI deployment.

Key Discussion Points:

– Privacy-Preserving AI Techniques: Explore cutting-edge techniques and
technologies designed to enable the use of AI without compromising individual
privacy, including federated learning, homomorphic encryption, and other
approaches that allow AI models to be trained without accessing raw, sensitive
data.

– Consent and Data Governance: Examine the role of informed consent in the
context of AI applications, best practices for transparently obtaining user
consent, and strategies for effective data governance in compliance with
evolving privacy regulations.

– Accountability and Transparency in AI Practices: Discuss the importance of
implementing accountability measures and ensuring transparency in AI operations
to build trust and enable verification. Examine frameworks for auditing AI
systems, the role of explainable AI in understanding decision-making processes,
and policies for addressing biases and errors that impact privacy and data
security.

Ginger Arbruster, Chief Privacy Officer and IT Division Director,

City of Seattle, Washington

 

Karen Habercross, Chief Privacy Officer, UChicago Medicine 

 

12:00 pm - 12:30 pm


E.P. MATHEW

Deputy CIO, Defense Intelligence Agency


KENNETH TOWNSEND

CISO, Ingredion


RICHARD RUSHING

CISO, Motorola Mobility


SCOTT HELLMAN

Supervisory Special Agent, FBI



TRANSFORMATIVE DEFENSE: UTILIZING AI TO COMBAT CYBER THREATS

The escalating sophistication of AI-driven cyberattacks necessitates a novel
approach in cybersecurity defense mechanisms.

Recent trends demonstrate adversaries utilizing AI for complex phishing
campaigns, leveraging deepfake technology for identity fraud, and automating
vulnerability exploitation. This session focuses on how security leaders can
utilize AI technologies to enhance defense capabilities, showcasing AI’s dual
potential as both a tool for attackers and a powerful ally in cybersecurity.
Key insights include leveraging machine learning for predictive threat
detection, employing AI-driven behavioral analytics to identify subtle anomalies
in network activity, and leverage emerging capabilities to improve system
robustness. The session aims to provide a strategic blueprint for integrating AI
into cybersecurity frameworks, thereby not only countering AI-exploited threats
but also setting a new standard for proactive defense.

Key Takeaways:

– Predictive Threat Detection: Implement the optimal AI strategy to forecast and
neutralize threats before they manifest, drastically reducing the potential
impact of cyberattacks.
– Anomaly Detection through Behavioral Analytics: Utilize AI to monitor network
behavior continuously, enabling the detection of deviations that signify
potential security breaches, enhancing the speed and accuracy of response.
– Collaborative Data Initiatives: An exploration of the significance of data
sharing across organizational boundaries, emphasizing the collective strength
derived from collaborative defense efforts.

This session will empower cybersecurity professionals with actionable strategies
for leveraging AI to build more resilient and adaptive security infrastructures,
ensuring preparedness against the ever-evolving landscape of AI-exploited cyber
threats.

E.P. Mathew, Deputy CIO, Defense Intelligence Agency

 

Kenneth Townsend, CISO, Ingredion

 

Richard Rushing, CISO, Motorola Mobility 

 

Scott Hellman, Supervisory Special Agent, FBI

12:30 pm - 1:00 pm


HEATHER WEST

Senior Director, Cybersecurity and Privacy Services, Venable


DAVID ANDERSON

Vice President, Cyber, Woodruff Sawyer


ANAHI SANTIAGO

CISO, ChristianaCare


ALEX VITRUK

Senior Associate Attorney, BakerHostetler


AI IN HEALTHCARE: ADDRESSING BIAS AND SECURITY RISKS

AI holds immense promise in revolutionizing healthcare, from fast-tracking
research and development to providing earlier diagnoses to personalized
treatment plans. However, as AI algorithms increasingly influence medical
decision-making, concerns about bias and discrimination have become increasingly
apparent. These biases can arise from inherent issues in AI datasets,
algorithmic design, and implementation, potentially perpetuating disparities in
healthcare delivery and outcomes.
This session will delve into the ethical, legal, and security implications of
healthcare discrimination facilitated by AI, including the erosion of trust,
patient harm, and legal challenges. We will explore how AI’s blind spots can
inadvertently reinforce existing biases and how representative datasets can help
mitigate these challenges.
 
Join us to examine the following key areas:
 
• Biases in AI Datasets: Understand how biases in training data can lead to
unequal healthcare outcomes and discuss the importance of using diverse and
representative datasets.
 
• Algorithmic Design, Implementation, and Security: Analyze how design choices
and system vulnerabilities can influence the fairness and safety of AI
applications.
 
• Mitigation and Protection Strategies: Discuss effective strategies to mitigate
bias in AI healthcare applications, emphasizing the need for ongoing oversight,
ethical standards, and robust security measures to ensure equitable and ethical
use of AI in healthcare.
 

Heather West, Senior Director, Cybersecurity and Privacy Services, 

Venable

David Anderson, Vice President, Cyber, Woodruff Sawyer

Anahi Santiago, CISO, ChristianaCare

Alex Vitruk, Senior Associate Attorney, BakerHostetler

1:00 pm - 1:30 pm


LISA SOTTO

Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton
Andrews Kurth LLP


TYLER MADDRY

Partner, Hunton Andrews Kurth LLP


IP AND PRIVACY LAW ISSUES IN GENERATIVE AI FOR CYBER LEADERS

As generative AI becomes an integral tool in cybersecurity, it brings
transformative potential alongside intricate legal challenges.

This session, tailored for experienced cybersecurity practitioners, will delve
into the critical legal issues surrounding generative AI. The session will
provide an overview of the latest generative AI technologies and their
implications. It will explore intellectual property law issues, including
potential legal risks, IP litigation, indemnification, and practical legal
recommendations. Additionally, it will address privacy and cybersecurity law,
emphasizing the importance of these principles and the unique risks posed by
generative AI. Attendees will gain insights into the US regulatory landscape and
the EU AI Act, essential legal considerations for maintaining privacy and
cybersecurity, and best practices for AI governance. This comprehensive session
aims to equip cybersecurity practitioners with the knowledge and strategies
needed to navigate the evolving legal landscape of generative AI effectively.

Key Takeaways: 

Understand the latest generative AI technologies and their impact on
cybersecurity.
• Identify and mitigate intellectual property risks associated with AI.
• Navigate the complex regulatory landscapes of privacy and cybersecurity law.
• Implement AI governance practices to ensure ethical and compliant use of AI.
 

Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity

Practice, Hunton Andrews Kurth LLP

 

Tyler Maddry, Partner, Hunton Andrews Kurth LLP

1:30 pm – 2:00 pm


VIRTUAL CYBERSECURITY SUMMIT


BEYOND SILOS: AI ADOPTION ACROSS INDUSTRIES

AI adoption has varied across industries, with different sectors serving as
laboratories of innovation in their approach.

From financial services and healthcare to legal, manufacturing, and logistics,
each sector faces unique challenges in leveraging AI for operational efficiency
and security enhancement in their respective domains.

In this open and candid discussion, esteemed information security leaders from
diverse fields will offer a panoramic view of AI’s impact across the business
spectrum. Participants will benefit from an in-depth exploration of how
different industries are not only utilizing AI but also navigating the
complexities of its adoption, with a special focus on the lessons learned in the
process.

Our closing panel will unveil the nuances of AI integration within their
sectors, shedding light on how AI technologies have been implemented to optimize
operations, enhance customer experiences, and bolster security postures against
increasingly sophisticated threats. More importantly, this session aims to
distill the collective experiences of these industry leaders into actionable
insights, highlighting the common hurdles encountered during AI adoption, from
ethical dilemmas and regulatory challenges to technical obstacles and workforce
implications.

Key Session Insights:

– Industry-Specific Insight: Learn how different industries are leveraging AI
for both operational excellence and enhanced security, highlighting innovative
uses and strategic deployments.

– Common Challenges and Solutions: A comprehensive look at shared difficulties,
including data privacy concerns, algorithm bias, and the integration with legacy
systems, alongside the strategies developed to overcome them.

– Critical Lessons Learned: Valuable takeaways from each industry’s experience
with AI, offering a roadmap of best practices, cautionary tales, and innovative
solutions that have emerged from real-world applications.

– Forward-Looking Strategies: Gain perspective on future developments of AI in
each sector, considering future applications, potential disruptions, and the
ongoing need for cross-industry collaboration and thought leadership.



2:00 PM - 2:30 PM


VIRTUAL CYBERSECURITY SUMMIT


STRATEGIC FRAMEWORKS FOR SECURE AI DEVELOPMENT: INTEGRATING AIBOMS FOR ENHANCED
TRUST AND VERIFICATION

As AI becomes integral to operational strategies, the imperative for secure,
trustworthy, and verifiable AI deployment intensifies.
 This session addresses the complexities of deploying AI models securely,
emphasizing the critical role of Artificial Intelligence Bills of Materials
(AIBOMs) in ensuring security, trust, and accuracy.  AIBOMs provide a detailed
inventory of components, data sets, and environments involved in AI model
development, crucial for oversight and control, especially for third-party AI
applications. Unlike Software Bills of Materials (SBOMs), AIBOMs include data
lineage, model training parameters, and ethical considerations, offering a
comprehensive view essential for maintaining transparency and trust. This
exploration into AIBOMs will highlight their importance in an organization’s
security posture, detailing practical steps for AI due diligence and third-party
AI platform evaluation. The discussion aims to build trust in AI through a focus
on technological robustness and the continuous assurance of model accuracy and
ethical deployment.
Key Session Insights:
• Understanding AIBOMs vs. SBOMs: Grasp the differences and the criticality of
AIBOMs for a transparent, controlled AI deployment.
• Building Trust in AI Systems: Explore validation methods for AI system
integrity and security, ensuring alignment with organizational values and
stakeholder trust.
• AI Due Diligence Checklist: A guide for information security leaders to
rigorously assess AI vendors, with a focus on security, accuracy, and ethical
considerations
 
2:30 pm - 3:00 pm


BILL FOSTER

Representative, Illinois 11th Congressional District


CONGRESSMAN BILL FOSTER ON AI'S REGULATORY FUTURE

Join us for an exclusive session with Congressman Bill Foster, a distinguished
member of the Congressional AI Taskforce. In this session, Congressman Foster
will delve into the mission of the Congressional Taskforce on Artificial
Intelligence, shedding light on its efforts to ensure America's leadership in AI
innovation while addressing crucial regulatory considerations.
Congressman Foster will discuss:
• How Congress, through bipartisan collaboration, is navigating the promises and
complexities of AI’s transformative use cases.
• The strategic initiatives outlined by the Taskforce, including guiding
principles and forward-looking recommendations.
• Bipartisan policy proposals developed in consultation with key committees of
jurisdiction.
Join us for a thought-provoking discussion that explores the intersection of
technology, governance, and the expanding use of artificial intelligence across
public and private sectors alike.

Bill Foster, Representative, Illinois 11th Congressional District




CLOSING COMMENTS

4:45 pm – 5:00 pM et





DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT

Register

#ISMGSummit



@ISMG_News





SPONSORS






GARY PHIPPS

Vice President Strategy & Business Transformation, GRCP CTPRP, CyberGRX


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


MATANDA DOSS

Executive Director, Cybersecurity and Technology Controls, Commercial Bank
JPMorgan Chase & Co.


GREG THOMPSON

VP, CISO, ManuLife


AARON BOSTICK

CISO, ThriveDX


ERIC SANCHEZ

CISO, Kyowa Kirin Pharmaceutical


COLIN BARRY

Director, Cyber Threat Intelligence Expedia Group


MICHAEL BRAY

CISO, The Vancouver Clinic


SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty




REGISTER

RSVP here to attend our events. You can select for multiple or individual
tickets. 





THE SUMMIT EXPERIENCE

Previous
Next
Previous
Next


CPE CREDITS

Engage offers Continuing Education Credits. Learn informative and engaging
content created specifically for security professionals.


Earn Credits
Claim Credits

Future Events


JULY 11, 2024

Enabling a New Era of Patient Care by Securing Connected Medical Devices
See Event


JULY 11, 2024

Unveiling RBI's New IT Governance Mandates: Essential Insights for CISOs
See Event


JULY 18, 2024

Healthcare Cybersecurity Summit: New York
See Event


JULY 18, 2024

AI Empowerment at Workplace: Revolutionizing Collaboration and Customer
Engagement
See Event


AUGUST 15, 2024

AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities
See Event

Future Events


JULY 11, 2024

Enabling a New Era of Patient Care by Securing Connected Medical Devices
See Event


JULY 11, 2024

Unveiling RBI's New IT Governance Mandates: Essential Insights for CISOs
See Event


JULY 18, 2024

Healthcare Cybersecurity Summit: New York
See Event


EVENT

 * Summits
 * Engage
 * Roundtables
 * Custom Events

 * Summits
 * Engage
 * Roundtables
 * Custom Events


ABOUT

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy



@ISMG_News #ISMGEngage




SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS

Send