Event Overview

The Virtual AI Summit by ISMG delves into a dynamic exploration of the intersection between AI and cybersecurity. Take a deep dive into ethical considerations, LLM security, and the intricate impacts on privacy and intellectual property. Engage directly with industry leaders to uncover the synergy between human intelligence and AI in fortifying cybersecurity, with a special focus on AI-driven threat detection and risk management strategies. This summit equips security professionals with vital AI insights, promoting transparent governance and hands-on application through sessions dedicated to real-world cybersecurity challenges. Expect a day packed with strategic dialogues, invaluable insights, and collaborative exploration at the forefront of AI and cybersecurity.

View our ISMG Event Experience video to see what your peers are saying about their participation.

Speaker

Robert Costello

Chief Information Officer, CISA

Speaker

Karen Habercoss

Chief Privacy Officer, UChicago Medicine

Speaker

Ginger Armbruster

Chief Privacy Officer and IT Division Director, City of Seattle, WA

Speaker

Tyler Maddry

Partner, Hunton Andrews Kurth LLP

Speaker

Lisa Sotto

Partner and Chair of Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP

Speaker

Kenneth Townsend

CISO, Ingredion

Speaker

E.P. Mathew

Deputy CIO, Defense Intelligence Agency

Speaker

Imran Ahmad

Partner/Canadian Head of Technology, Norton Rose Fulbright

Speaker

John Horn

Director, Cybersecurity Practice, Datos Insights

Speaker

Heather West

Senior Director, Cybersecurity and Privacy Services, Venable

Speaker

Anahi Santiago

CISO, ChristianaCare

Speaker

Ray Griffin

CISO and Head of Information Security, Cox Media Group

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Opening Remarks

9:55 AM ET - 10:00 AM ET

10:00 am - 10:30 am

A Road Map for New Terrain: Strategic Insights From CISA's CIO Robert Costello

Join us for an insightful keynote fireside chat with Robert Costello, chief information officer of CISA, as he discusses the dynamic intersection of artificial intelligence and cybersecurity. This session will cover the pivotal work CISA is doing to integrate AI in bolstering cyber defenses, including their recently developed AI road map.

Costello will share insight from CISA’s strategic action plan, which focuses on responsible AI use, securing AI systems and mitigating AI-related threats to critical infrastructure. Additionally, the discussion will highlight the evolving cyber risks and how AI can be leveraged to enhance national security. Attendees will also learn how their organizations can utilize AI to enhance their cybersecurity posture, with insights into CISA’s available resources and collaborative opportunities. This is a unique opportunity for information security practitioners in government to gain valuable insights from one of the leading voices in the field.

Key takeaways:

  • Detailed understanding of CISA’s AI road map: Learn the specific steps and timelines in CISA’s comprehensive plan for integrating AI into national cybersecurity efforts, including key initiatives and expected outcomes.
  • Best Practices for secure AI system development: Gain in-depth knowledge of CISA’s guidelines for secure AI system development, including specific risk mitigation techniques, compliance requirements, and examples of successful implementation.
  • Advanced strategies to protect critical infrastructure: Discover CISA’s latest strategies for using AI to defend against sophisticated threats targeting critical infrastructure, with real-world examples, actionable recommendations, and insights into collaboration with international partners and private sector stakeholders.
  • Leveraging AI for enhanced cybersecurity: Explore how organizations can implement AI to improve their cybersecurity posture, utilizing resources and guidance from CISA to stay ahead of emerging threats and enhance overall cyber resilience.
Robert Costello, Chief Information Officer, CISA
10:30 AM - 11:00 AM

Accelerate AI Innovation Securely with AI-SPM

As organizations increasingly migrate to the cloud, the landscape of cybersecurity is evolving at a rapid pace. The advent of Artificial Intelligence (AI) brings both unprecedented opportunities and challenges, making it important for cloud security strategies to advance accordingly.

Join this session to hear from Wiz why organizations are adopting AI-SPM (AI- Security Posture Management) into their CNAPP strategy and how you can effectively secure AI workloads in the cloud while accelerating AI innovation securely.

Shaked Rotlevi, Technical Product Marketing Manager, Wiz
11:00 AM - 11:30 AM

An In Depth Look at AI & the Evolving Cyber Threat Landscape

In the rapidly evolving landscape of cyber warfare, understanding and responding to the latest threats is crucial. This session offers unparalleled insights tailored to the frontline incident response and threat intelligence experts who tackle high-impact cyberattacks daily. We will cover the current threat landscape, evolutions in the attack surface, the role of AI in cybersecurity, advancements and shortcomings in defenses, and how Google Cloud is helping to bridge critical security gaps. Join us to equip yourself with the knowledge and strategies needed to navigate the complexities of modern cyber threats.

Key discussion points:

  • Current Threat Landscape: Identifying the most significant attacks and attackers impacting organizations today. Understand the prevalent and dangerous cyber threats that enterprises face.
  • Evolving Attack Surface: Assessing how the attack surface has changed over the past year and the implications for security strategies. Explore how digital transformation and remote work have expanded vulnerabilities.
  • AI in Cybersecurity: Exploring the dual role of AI in both facilitating cyber attacks and bolstering cybersecurity defenses. Discuss how AI is used by adversaries and defenders alike.
  • Defensive Adaptations: Reviewing the advancements and shortcomings in security defenses over the past year. Highlight effective measures, existing gaps, and innovative solutions.
Tim Gallo, Head of Global Solutions Architects, Google
12:00 PM - 12:30 PM

How to Simplify Data Security for GenAI

Generative AI transformation is inevitable – but what does this mean? How can cybersecurity solutions scale to provide modern solutions for AI adoption? Join Ronan Murphy, a Member of the AI Advisory Council for the Government of Ireland, and Forcepoint’s Vice President of Product Management, Jaimen Hoopes, for an in-depth look at the benefits and risks of popular Generative AI assistants such as ChatGPT, Gemini, Copilot and others and more importantly, a glimpse at a technology designed to secure Generative AI usage.

Join Ronan Murphy, a Member of the AI Advisory Council for the Government of Ireland, and Forcepoint’s Vice President of Product Management, Jaimen Hoopes, for an in-depth look at the benefits and risks of popular Generative AI assistants such as ChatGPT, Gemini, Copilot and others and more importantly, a glimpse at a technology designed to secure Generative AI usage.

Learn about the modern security for GenAI tools and the latest tools to minimize risk and maximize productivity and efficiency. In this 30-minute discussion, our panelists will cover:

  • A brief history of the benefits of GenAI tools
  • Recent security concerns for GenAI tools pulled straight from the headlines
  • What AI transformation is and how provisions for securing AI are crucial
  • What is ‘AI Mesh’ and how it provides the advantage
  • How DSPM and AI Mesh work together to secure GenAI

What role does a CISO play in operationalizing data protection and privacy regulations?

The session will cover:

Jaimen Hoopes, Vice President of Product Management, Data Security Solutions
Ronan Murphy, Member of the AI Advisory Council, Government of Ireland
12:00 PM - 12:30 PM

Building Tomorrow Securely... Securing the Use of AI in App Development

Join Liqian Lim, Senior Product Marketing Manager, AI/ML at Snyk, a developer security platform for application security, as she talks about how organisations can build tomorrow with AI – securely.

In this session, we will cover:

  • The importance of AI-fitness and wellness.
  • The risks of not being secure before adoption.
  • Surprising survey results on organisational AI readiness.
  • Foundational steps to building an AI. protection strategy for your SDLC.
  • Key features to look out for in your chosen protection.
Liquian Lim, Senior Product Marketing Manager, Snyk
1:00 PM - 1:15 PM

AI-Driven Cyber Investigations

Dealing with the barrage of cyber incidents, knowing when to sound the alarm, how to react, what to investigate, and how to recover are no easy feats for IT and security teams.

Couple this with the complexity of navigating your own unique data estate and infrastructure and the constantly evolving nature of attacks. Making mistakes can cost millions along with irreparable brand damage. And if we are talking about critical infrastructure impacted by cyberattacks, such as healthcare and public utilities, human lives could be at stake.

Cook will discuss how IT and security teams, at all levels of cyber expertise, can leverage AI to accelerate cyber investigation and recovery.

Jason Cook, AVP Worldwide Partner Sales Engineering, Rubrik
1:15 PM - 2:00 PM

IP and Privacy Law Issues in Generative AI for Cyber Leaders

As gen AI becomes an integral tool in cybersecurity, it brings transformative potential alongside intricate legal challenges.

This session, tailored for experienced cybersecurity practitioners, will delve into the critical legal issues surrounding gen AI. The session will provide an overview of the latest gen AI technologies and their implications. It will explore intellectual property law issues, including potential legal risks, IP litigation, indemnification, and practical legal recommendations. Additionally, it will address privacy and cybersecurity law, emphasizing the importance of these principles and the unique risks posed by gen AI. Attendees will gain insights into the U.S. regulatory landscape and the EU AI Act, essential legal considerations for maintaining privacy and cybersecurity, and best practices for AI governance. This comprehensive session aims to equip cybersecurity practitioners with the knowledge and strategies needed to navigate the evolving legal landscape of gen AI effectively.

Key takeaways:

  • Understand the latest gen AI technologies and their impact on cybersecurity;
  • Identify and mitigate IP risks associated with AI;
  • Navigate the complex regulatory landscapes of privacy and cybersecurity law;
  • Implement AI governance practices to ensure ethical and compliant use of AI.
Lisa Sotto, Partner and Chair of the Global Privacy and Cybersecurity Practice, Hunton Andrews Kurth LLP
Tyler Maddry, Partner, Hunton Andrews Kurth LLP
2:00 PM - 2:30 PM
TRACK A

Securing the Road: Why Vulnerabilities in Electric Logging Devices are Everyone's Problem

As cyberthreat actors adapt and enhance their methods, the vulnerabilities in electronic logging devices (ELDs) used in over 14 million medium- and heavy-duty commercial trucks in the United States serve as a stark reminder of the widespread impact of insecure IoT systems.

This session, tailored for CISOs and cybersecurity leaders across various industries, will provide crucial insights into these vulnerabilities. While the primary focus is on transportation, the speakers’ insights into IoT vulnerabilities, wireless network security, and firmware integrity will be applicable to many sectors, including manufacturing, healthcare, finance, and critical infrastructure. Learn how ELDs, mandated to track driving hours and log critical vehicle data, can be exploited via Bluetooth or Wi-Fi connections, leading to unauthorized control, data manipulation, and malware propagation. These insights are not just crucial for the transportation sector but resonate across all industries reliant on interconnected and IoT systems.

The final vulnerability, and perhaps the most concerning, is the potential for a self-propagating truck-to-truck worm, which takes advantage of the inherent networked nature of these devices. Such an attack could lead to widespread disruptions in commercial fleets, with severe safety and operational implications.

Key takeaways:

  • Understanding the parallels between ELD vulnerabilities and broader IoT security challenges affecting various industries;
  • Practical measures to safeguard interconnected systems and prevent widespread operational disruptions;
  • The importance of cross-industry collaboration in tackling emerging cybersecurity threats.
Peeyush Patel, CISO, XPO
Jeremy Daily, Associate Professor, Colorado State University
TRACK B

AI in Healthcare: Addressing Bias and Security Risks

AI holds immense promise in revolutionizing healthcare, from fast-tracking research and development to providing earlier diagnoses to personalized treatment plans.

However, as AI algorithms increasingly influence medical decision-making, concerns about bias and discrimination have become more apparent. These biases can arise from inherent issues in AI datasets, algorithmic design, and implementation, potentially perpetuating disparities in healthcare delivery and outcomes. This session will delve into the ethical, legal, and security implications of healthcare discrimination facilitated by AI, including the erosion of trust, patient harm, and legal challenges. We will explore how AI’s blind spots can inadvertently reinforce existing biases and how representative datasets can help mitigate these challenges.

Join us to examine the following key areas:

  • Biases in AI datasets: Understand how biases in training data can lead to unequal healthcare outcomes and discuss the importance of using diverse and representative datasets.
  • Algorithmic design, implementation and security: Analyze how design choices and system vulnerabilities can influence the fairness and safety of AI applications.
  • Mitigation and protection strategies: Discuss effective strategies to mitigate bias in AI healthcare applications, emphasizing the need for ongoing oversight, ethical standards, and robust security measures to ensure equitable and ethical use of AI in healthcare.
Heather West, Senior Director, Cybersecurity and Privacy Services, Venable
David Anderson, Vice President, Cyber, Woodruff Sawyer
Anahi Santiago, CISO, ChristianaCare
Alex Vitruk, Senior Associate Attorney, BakerHostetler
2:30 PM - 3:00 PM
TRACK A

Privacy & Compliance in the Age of AI

Artificial intelligence has emerged as an indelible and disruptive force in information security, particularly in bolstering defensive capabilities through sophisticated data analysis and pattern recognition.

As organizations harness the power of AI to fortify their cybersecurity posture, a pivotal challenge emerges: striking the delicate balance between robust threat prevention and the protection of individual and organizational privacy.

This session will address the need to safeguard data privacy, along with the governance and compliance considerations necessitated by the proliferation of AI utilization. Beyond simply identifying challenges, this session will serve as a practical guide, offering actionable strategies for the ethical implementation of AI in cybersecurity operations.

Tailored for CISOs, IT professionals, data scientists, and all stakeholders intrigued by the intricate interplay of AI, ethics, and security, the discussion aims to shape a responsible and privacy-conscious approach to AI deployment.

Key discussion points:

  • Privacy-preserving AI techniques: Explore cutting-edge techniques and technologies designed to enable the use of AI without compromising individual privacy, including federated learning, homomorphic encryption, and other approaches that allow AI models to be trained without accessing raw, sensitive data.
  • Consent and data governance: Examine the role of informed consent in the context of AI applications, best practices for transparently obtaining user consent, and strategies for effective data governance in compliance with evolving privacy regulations.
  • Accountability and transparency in AI practices: Discuss the importance of implementing accountability measures and ensuring transparency in AI operations to build trust and enable verification. Examine frameworks for auditing AI systems, the role of explainable AI in understanding decision-making processes, and policies for addressing biases and errors that impact privacy and data security.
Ginger Armbruster, Chief Privacy Officer and IT Division Director
Karen Habercoss, Chief Privacy Officer, UChicago Medicine
TRACK B

Harnessing AI in Cybersecurity: Lessons from the C-Suite

AI’s rapid emergence across every aspect of business operations serves as both a catalyst for growth and a vector for heightened risk.

Our panel of leading CISOs will offer an unfiltered glimpse into the strategic deployment of AI by information security practitioners. These industry leaders will share their direct experiences, focusing on the transformative role AI plays in enhancing security measures, the challenges of integrating AI into existing frameworks, and the innovative strategies developed to mitigate associated risks. Attendees will leave with a comprehensive perspective on strategic AI integration, including:

  • Real-world deployment: Delve into how top organizations have successfully integrated AI into their security operations, highlighting the decision-making processes, implementation strategies, and adjustments made to align AI initiatives with security goals.
  • Navigating challenges: Unpack the hurdles encountered by CISOs in adopting AI, from overcoming data bias and ensuring privacy to securing AI systems against adversarial attacks, and the practical solutions that were employed.
  • Mitigating risks: Gain actionable insights into the risk management practices refined through firsthand experiences, including the development of robust frameworks to assess and mitigate the unique risks posed by AI.
  • Adapting to an AI-driven security landscape: Learn from the foresight and adaptability of leading security practitioners as they prepare their organizations for the future, ensuring resilience against the evolving threat landscape influenced by AI.
Imran Ahmad, Partner, Canadian Head of Technology, Norton Rose Fulbright
Ray Griffin, CISO and Head of Information Security, Cox Media Group
John Horn, Director, Cybersecurity Practice, Datos Insights
3:00 PM - 3:15 PM ET

US Rep. Bill Foster on AI's Regulatory Future

Join us for an exclusive session with U.S. Rep. Bill Foster, a distinguished member of the Congressional Artificial Intelligence Task Force. In this session, U.S. Rep. Foster will delve into the mission of the Congressional Task Force on Artificial Intelligence, shedding light on its efforts to ensure America's leadership in AI innovation while addressing crucial regulatory considerations.

Join us for a thought-provoking discussion that explores the intersection of technology, governance, and the expanding use of artificial intelligence across public and private sectors alike.

U.S. Rep. Foster will discuss:

  • How Congress, through bipartisan collaboration, is navigating the promises and complexities of AI’s transformative use cases;
  • The strategic initiatives outlined by the Task Force, including guiding principles and forward-looking recommendations;
  • Bipartisan policy proposals developed in consultation with key committees of jurisdiction.
Bill Foster, U.S. Representative, Illinois 11th Congressional District

Editor's Panel

3:15 PM ET - 3:25 PM ET

Closing Comments

3:25 PM ET

On Demand

THROUGH AUGUST 16TH