ismg.events
Open in
urlscan Pro
151.101.2.159
Public Scan
URL:
https://ismg.events/summit/virtual-cybersecurity-2024/?utm_source=Marketo&utm_medium=SavetheDate_HTML&utm_campaign=E...
Submission: On July 11 via api from IN — Scanned from US
Submission: On July 11 via api from IN — Scanned from US
Form analysis
1 forms found in the DOMName: Subscribe-Footer — POST
<form class="elementor-form" method="post" name="Subscribe-Footer">
<input type="hidden" name="post_id" value="5731">
<input type="hidden" name="form_id" value="21b9e35">
<input type="hidden" name="referer_title" value="Virtual Cybersecurity Summit">
<input type="hidden" name="queried_id" value="15138">
<div class="elementor-form-fields-wrapper elementor-labels-above">
<div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-75 elementor-field-required">
<input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-xs elementor-field-textual" placeholder="Email" required="required" aria-required="true">
</div>
<div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
<div class="elementor-field" id="form-field-field_4cf4815">
<div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-6zyb9r7jq22" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&hl=en&type=v3&v=rKbTvxTxwcw5VqzrtN-ICwWt&size=invisible&badge=bottomright&sa=Form&cb=9o92kf2kdmy5"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
</div>
<div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-40 e-form__buttons">
<button type="submit" class="elementor-button elementor-size-sm">
<span>
<span class=" elementor-button-icon">
</span>
<span class="elementor-button-text">Send</span>
</span>
</button>
</div>
</div>
</form>
Text Content
Skip to content * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About Menu * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About AUGUST 15, 2024 AI'S DOUBLE-EDGED SWORD: NAVIGATING RISKS WHILE UNLOCKING OPPORTUNITIES 10:00 AM ET - 3:00 PM ET VIRTUAL EVENT Register Now View Agenda Overview Topics Agenda Speakers CPE Credits Register Overview Topics Agenda Speakers CPE Credits Register EVENT OVERVIEW The Virtual AI Summit by ISMG delves into a dynamic exploration of the intersection between AI and cybersecurity. Take a deep dive into ethical considerations, LLM security, and the intricate impacts on privacy and intellectual property. Engage directly with industry leaders to uncover the synergy between human intelligence and AI in fortifying cybersecurity, with a special focus on AI-driven threat detection and risk management strategies. This summit equips security professionals with vital AI insights, promoting transparent governance and hands-on application through sessions dedicated to real-world cybersecurity challenges. Expect a day packed with strategic dialogues, invaluable insights, and collaborative exploration at the forefront of AI and cybersecurity. View our ISMG Event Experience video to see what your peers are saying about their participation. Download our Summit Brochure VENUE VIRTUAL NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity. HIGHLIGHT TOPICS * Leveraging AI for Defense * Balancing Privacy and Compliance * Secure AI Integration * Combatting Threats With AI * Diverse Industry AI Applications Register SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats View Faculty ROBERT COSTELLO CIO, CISA KAREN HABERCROSS Chief Privacy Officer, UChicago Medicine GINGER ARMBRUSTER Chief Privacy Officer and IT Division Director, City of Seattle, WA TYLER MADDRY Partner, Hunton Andrews Kurth LLP LISA SOTTO Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP ERIC SANCHEZ CISO, Kyowa Kirin Pharmaceutical E.P. MATHEW Deputy CIO, Defense Intelligence Agency IMRAN AHMAD Partner/Canadian Head of Technology, Norton Rose Fulbright JOHN HORN Head of Cybersecurity Practice, Datos Insights HEATHER WEST Senior Director, Cybersecurity and Privacy Services, Venable LLP ANAHI SANTIAGO CISO, National General, ChristianaCare RAY GRIFFIN CISO and Head of Information Security, Cox Media Group SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats View Faculty You can now view or download a PDF version of the attendee guide. Download Agenda OPENING REMARKS 9:00 am et - 9:15 am et You can now view or download a PDF version of the attendee guide. Download Agenda 9:00 am et - 9:15 am et 10:00 am - 10:30 am ROBERT COSTELLO Chief Information Officer, CISA A ROADMAP FOR NEW TERRAIN: STRATEGIC INSIGHTS FROM CISA'S CIO ROBERT COSTELLO Join us for an insightful keynote fireside chat with Robert Costello, Chief Information Officer of CISA, as he discusses the dynamic intersection of Artificial Intelligence and cybersecurity. This session will cover the pivotal work of CISA is doing to integrate AI in bolstering cyber defenses, including their recently developed AI Roadmap. Costello will share insight from CISA’s strategic action plan, which focuses on responsible AI use, securing AI systems, and mitigating AI-related threats to critical infrastructure. Additionally, the discussion will highlight the evolving cyber risks and how AI can be leveraged to enhance national security. Attendees will also learn how thier organizations can utilize AI to enhance their cybersecurity posture, with insights into CISA’s available resources and collaborative opportunities. This is a unique opportunity for information security practitioners in government to gain valuable insights from one of the leading voices in the field. Key Takeaways: * Detailed Understanding of CISA’s AI Roadmap: Learn the specific steps and timelines in CISA’s comprehensive plan for integrating AI into national cybersecurity efforts, including key initiatives and expected outcomes. * Best Practices for Secure AI System Development: Gain in-depth knowledge of CISA’s guidelines for secure AI system development, including specific risk mitigation techniques, compliance requirements, and examples of successful implementation. * Advanced Strategies to Protect Critical Infrastructure: Discover CISA’s latest strategies for using AI to defend against sophisticated threats targeting critical infrastructure, with real-world examples, actionable recommendations, and insights into collaboration with international partners and private sector stakeholders. * Leveraging AI for Enhanced Cybersecurity: Explore how organizations can implement AI to improve their cybersecurity posture, utilizing resources and guidance from CISA to stay ahead of emerging threats and enhance overall cyber resilience. Robert Costello, Chief Information Officer, CISA 10:30 AM - 11:00 AM VIRTUAL CYBERSECURITY SUMMIT CLOUD SECURITY MATURITY AND THE NEED FOR PROACTIVE AND REACTIVE APPROACHES Enterprises of all sizes are moving to the cloud or expanding their footprint, and cloud environments are becoming more complex. Security leaders are constantly trying to improve their overall security posture. Some primarily focus on reducing risk, and others maintain a detection-first mindset. So, what is the right approach? The answer is both. But which approach should be the focus today depends on the enterprise’s security maturity. In this session, we will discuss: * What cloud security maturity is and the path to achieving it; * Creating an effective security backstop with cloud detection and response; * How reactive security should be an enabler for proactive security. Shashank Golla, Product Marketing Manager, Wiz 11:00 am - 11:30 am GINGER ARMBRUSTER Chief Privacy Officer and IT Division Director, City of Seattle, Washington KAREN HABERCROSS Chief Privacy Officer, UChicago Medicine PRIVACY & COMPLIANCE IN THE AGE OF AI Artificial Intelligence has emerged as an indelible and disruptive force in information security, particularly in bolstering defensive capabilities through sophisticated data analysis and pattern recognition. As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy. This session addresses the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session serves as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations. Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, our discussion aims to shape a responsible and privacy-conscious approach to AI deployment. Key Discussion Points: – Privacy-Preserving AI Techniques: Explore cutting-edge techniques and technologies designed to enable the use of AI without compromising individual privacy, including federated learning, homomorphic encryption, and other approaches that allow AI models to be trained without accessing raw, sensitive data. – Consent and Data Governance: Examine the role of informed consent in the context of AI applications, best practices for transparently obtaining user consent, and strategies for effective data governance in compliance with evolving privacy regulations. – Accountability and Transparency in AI Practices: Discuss the importance of implementing accountability measures and ensuring transparency in AI operations to build trust and enable verification. Examine frameworks for auditing AI systems, the role of explainable AI in understanding decision-making processes, and policies for addressing biases and errors that impact privacy and data security. Ginger Arbruster, Chief Privacy Officer and IT Division Director, City of Seattle, Washington Karen Habercross, Chief Privacy Officer, UChicago Medicine 12:00 pm - 12:30 pm E.P. MATHEW Deputy CIO, Defense Intelligence Agency KENNETH TOWNSEND CISO, Ingredion RICHARD RUSHING CISO, Motorola Mobility SCOTT HELLMAN Supervisory Special Agent, FBI TRANSFORMATIVE DEFENSE: UTILIZING AI TO COMBAT CYBER THREATS The escalating sophistication of AI-driven cyberattacks necessitates a novel approach in cybersecurity defense mechanisms. Recent trends demonstrate adversaries utilizing AI for complex phishing campaigns, leveraging deepfake technology for identity fraud, and automating vulnerability exploitation. This session focuses on how security leaders can utilize AI technologies to enhance defense capabilities, showcasing AI’s dual potential as both a tool for attackers and a powerful ally in cybersecurity. Key insights include leveraging machine learning for predictive threat detection, employing AI-driven behavioral analytics to identify subtle anomalies in network activity, and leverage emerging capabilities to improve system robustness. The session aims to provide a strategic blueprint for integrating AI into cybersecurity frameworks, thereby not only countering AI-exploited threats but also setting a new standard for proactive defense. Key Takeaways: – Predictive Threat Detection: Implement the optimal AI strategy to forecast and neutralize threats before they manifest, drastically reducing the potential impact of cyberattacks. – Anomaly Detection through Behavioral Analytics: Utilize AI to monitor network behavior continuously, enabling the detection of deviations that signify potential security breaches, enhancing the speed and accuracy of response. – Collaborative Data Initiatives: An exploration of the significance of data sharing across organizational boundaries, emphasizing the collective strength derived from collaborative defense efforts. This session will empower cybersecurity professionals with actionable strategies for leveraging AI to build more resilient and adaptive security infrastructures, ensuring preparedness against the ever-evolving landscape of AI-exploited cyber threats. E.P. Mathew, Deputy CIO, Defense Intelligence Agency Kenneth Townsend, CISO, Ingredion Richard Rushing, CISO, Motorola Mobility Scott Hellman, Supervisory Special Agent, FBI 12:30 pm - 1:00 pm HEATHER WEST Senior Director, Cybersecurity and Privacy Services, Venable DAVID ANDERSON Vice President, Cyber, Woodruff Sawyer ANAHI SANTIAGO CISO, ChristianaCare ALEX VITRUK Senior Associate Attorney, BakerHostetler AI IN HEALTHCARE: ADDRESSING BIAS AND SECURITY RISKS AI holds immense promise in revolutionizing healthcare, from fast-tracking research and development to providing earlier diagnoses to personalized treatment plans. However, as AI algorithms increasingly influence medical decision-making, concerns about bias and discrimination have become increasingly apparent. These biases can arise from inherent issues in AI datasets, algorithmic design, and implementation, potentially perpetuating disparities in healthcare delivery and outcomes. This session will delve into the ethical, legal, and security implications of healthcare discrimination facilitated by AI, including the erosion of trust, patient harm, and legal challenges. We will explore how AI’s blind spots can inadvertently reinforce existing biases and how representative datasets can help mitigate these challenges. Join us to examine the following key areas: • Biases in AI Datasets: Understand how biases in training data can lead to unequal healthcare outcomes and discuss the importance of using diverse and representative datasets. • Algorithmic Design, Implementation, and Security: Analyze how design choices and system vulnerabilities can influence the fairness and safety of AI applications. • Mitigation and Protection Strategies: Discuss effective strategies to mitigate bias in AI healthcare applications, emphasizing the need for ongoing oversight, ethical standards, and robust security measures to ensure equitable and ethical use of AI in healthcare. Heather West, Senior Director, Cybersecurity and Privacy Services, Venable David Anderson, Vice President, Cyber, Woodruff Sawyer Anahi Santiago, CISO, ChristianaCare Alex Vitruk, Senior Associate Attorney, BakerHostetler 1:00 pm - 1:30 pm LISA SOTTO Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP TYLER MADDRY Partner, Hunton Andrews Kurth LLP IP AND PRIVACY LAW ISSUES IN GENERATIVE AI FOR CYBER LEADERS As generative AI becomes an integral tool in cybersecurity, it brings transformative potential alongside intricate legal challenges. This session, tailored for experienced cybersecurity practitioners, will delve into the critical legal issues surrounding generative AI. The session will provide an overview of the latest generative AI technologies and their implications. It will explore intellectual property law issues, including potential legal risks, IP litigation, indemnification, and practical legal recommendations. Additionally, it will address privacy and cybersecurity law, emphasizing the importance of these principles and the unique risks posed by generative AI. Attendees will gain insights into the US regulatory landscape and the EU AI Act, essential legal considerations for maintaining privacy and cybersecurity, and best practices for AI governance. This comprehensive session aims to equip cybersecurity practitioners with the knowledge and strategies needed to navigate the evolving legal landscape of generative AI effectively. Key Takeaways: Understand the latest generative AI technologies and their impact on cybersecurity. • Identify and mitigate intellectual property risks associated with AI. • Navigate the complex regulatory landscapes of privacy and cybersecurity law. • Implement AI governance practices to ensure ethical and compliant use of AI. Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP Tyler Maddry, Partner, Hunton Andrews Kurth LLP 1:30 pm – 2:00 pm VIRTUAL CYBERSECURITY SUMMIT BEYOND SILOS: AI ADOPTION ACROSS INDUSTRIES AI adoption has varied across industries, with different sectors serving as laboratories of innovation in their approach. From financial services and healthcare to legal, manufacturing, and logistics, each sector faces unique challenges in leveraging AI for operational efficiency and security enhancement in their respective domains. In this open and candid discussion, esteemed information security leaders from diverse fields will offer a panoramic view of AI’s impact across the business spectrum. Participants will benefit from an in-depth exploration of how different industries are not only utilizing AI but also navigating the complexities of its adoption, with a special focus on the lessons learned in the process. Our closing panel will unveil the nuances of AI integration within their sectors, shedding light on how AI technologies have been implemented to optimize operations, enhance customer experiences, and bolster security postures against increasingly sophisticated threats. More importantly, this session aims to distill the collective experiences of these industry leaders into actionable insights, highlighting the common hurdles encountered during AI adoption, from ethical dilemmas and regulatory challenges to technical obstacles and workforce implications. Key Session Insights: – Industry-Specific Insight: Learn how different industries are leveraging AI for both operational excellence and enhanced security, highlighting innovative uses and strategic deployments. – Common Challenges and Solutions: A comprehensive look at shared difficulties, including data privacy concerns, algorithm bias, and the integration with legacy systems, alongside the strategies developed to overcome them. – Critical Lessons Learned: Valuable takeaways from each industry’s experience with AI, offering a roadmap of best practices, cautionary tales, and innovative solutions that have emerged from real-world applications. – Forward-Looking Strategies: Gain perspective on future developments of AI in each sector, considering future applications, potential disruptions, and the ongoing need for cross-industry collaboration and thought leadership. 2:00 PM - 2:30 PM VIRTUAL CYBERSECURITY SUMMIT STRATEGIC FRAMEWORKS FOR SECURE AI DEVELOPMENT: INTEGRATING AIBOMS FOR ENHANCED TRUST AND VERIFICATION As AI becomes integral to operational strategies, the imperative for secure, trustworthy, and verifiable AI deployment intensifies. This session addresses the complexities of deploying AI models securely, emphasizing the critical role of Artificial Intelligence Bills of Materials (AIBOMs) in ensuring security, trust, and accuracy. AIBOMs provide a detailed inventory of components, data sets, and environments involved in AI model development, crucial for oversight and control, especially for third-party AI applications. Unlike Software Bills of Materials (SBOMs), AIBOMs include data lineage, model training parameters, and ethical considerations, offering a comprehensive view essential for maintaining transparency and trust. This exploration into AIBOMs will highlight their importance in an organization’s security posture, detailing practical steps for AI due diligence and third-party AI platform evaluation. The discussion aims to build trust in AI through a focus on technological robustness and the continuous assurance of model accuracy and ethical deployment. Key Session Insights: • Understanding AIBOMs vs. SBOMs: Grasp the differences and the criticality of AIBOMs for a transparent, controlled AI deployment. • Building Trust in AI Systems: Explore validation methods for AI system integrity and security, ensuring alignment with organizational values and stakeholder trust. • AI Due Diligence Checklist: A guide for information security leaders to rigorously assess AI vendors, with a focus on security, accuracy, and ethical considerations 2:30 pm - 3:00 pm BILL FOSTER Representative, Illinois 11th Congressional District CONGRESSMAN BILL FOSTER ON AI'S REGULATORY FUTURE Join us for an exclusive session with Congressman Bill Foster, a distinguished member of the Congressional AI Taskforce. In this session, Congressman Foster will delve into the mission of the Congressional Taskforce on Artificial Intelligence, shedding light on its efforts to ensure America's leadership in AI innovation while addressing crucial regulatory considerations. Congressman Foster will discuss: • How Congress, through bipartisan collaboration, is navigating the promises and complexities of AI’s transformative use cases. • The strategic initiatives outlined by the Taskforce, including guiding principles and forward-looking recommendations. • Bipartisan policy proposals developed in consultation with key committees of jurisdiction. Join us for a thought-provoking discussion that explores the intersection of technology, governance, and the expanding use of artificial intelligence across public and private sectors alike. Bill Foster, Representative, Illinois 11th Congressional District CLOSING COMMENTS 4:45 pm – 5:00 pM et DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT Register #ISMGSummit @ISMG_News SPONSORS GARY PHIPPS Vice President Strategy & Business Transformation, GRCP CTPRP, CyberGRX ROB KNOBLAUCH Deputy CISO and VP Global Security Services , Scotiabank MATANDA DOSS Executive Director, Cybersecurity and Technology Controls, Commercial Bank JPMorgan Chase & Co. GREG THOMPSON VP, CISO, ManuLife AARON BOSTICK CISO, ThriveDX ERIC SANCHEZ CISO, Kyowa Kirin Pharmaceutical COLIN BARRY Director, Cyber Threat Intelligence Expedia Group MICHAEL BRAY CISO, The Vancouver Clinic SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats View Faculty REGISTER RSVP here to attend our events. You can select for multiple or individual tickets. THE SUMMIT EXPERIENCE Previous Next Previous Next CPE CREDITS Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals. Earn Credits Claim Credits Future Events JULY 11, 2024 Enabling a New Era of Patient Care by Securing Connected Medical Devices See Event JULY 11, 2024 Unveiling RBI's New IT Governance Mandates: Essential Insights for CISOs See Event JULY 18, 2024 Healthcare Cybersecurity Summit: New York See Event JULY 18, 2024 AI Empowerment at Workplace: Revolutionizing Collaboration and Customer Engagement See Event AUGUST 15, 2024 AI's Double-Edged Sword: Navigating Risks While Unlocking Opportunities See Event Future Events JULY 11, 2024 Enabling a New Era of Patient Care by Securing Connected Medical Devices See Event JULY 11, 2024 Unveiling RBI's New IT Governance Mandates: Essential Insights for CISOs See Event JULY 18, 2024 Healthcare Cybersecurity Summit: New York See Event EVENT * Summits * Engage * Roundtables * Custom Events * Summits * Engage * Roundtables * Custom Events ABOUT * Sponsorship * Leadership * Company * Privacy Policy * Sponsorship * Leadership * Company * Privacy Policy @ISMG_News #ISMGEngage SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS Send