february 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

9:55 - 16:05 SGT | Virtual Event
On Demand February 12, 2025
Register Now Login

Event Overview

The 2025 ISMG Virtual AI Security Summit is the ultimate digital gathering for cybersecurity leaders and AI innovators, offering unique case studies into how artificial intelligence is transforming security strategies across diverse sectors. This global summit will feature actionable perspectives from top industry experts, exploring AI’s role in shaping the future of threat defense and identity protection.

Attendees will gain insights into how AI is not only being weaponized by cybercriminals but also driving innovations in identity verification, supply chain security, and the integration of advanced computing technologies to counter increasingly sophisticated threats. Sessions will explore real-world applications, tackle pressing ethical challenges, and offer a roadmap for navigating the complexities of AI-driven cybersecurity.

Gain the strategies and knowledge necessary to fortify your defenses and stay ahead of AI’s transformative impact on information security. Join us for unparalleled access to a global brain trust of thought leadership at the cutting edge of cybersecurity and machine learning.

View our ISMG Event Experience video to see what your peers are saying about their participation.
Speaker

Kush Sharma

Director, Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario

Speaker

Dr. Denise Turley

Executive Leader in AI

Speaker

Sergio Trindade

CISO, Águas do Tejo Atlântico

Speaker

Patrick Bangert

VP and Chief of AI, Oxy

Speaker

Noah Ringler

Artificial Intelligence Policy Lead, U.S. Department of Homeland Security

Speaker

Rick Doten

VP, CISO, Information Security, Centene Corporation, Carolina Complete Health

Speaker

Mike Manrod

CISO, Grand Canyon Education

Speaker

Andres Andreu

Deputy CISO, Hearst

Speaker

Sergio Gago

Managing Director, AI and Quantum, Moody's Analytics

Speaker

Phillip Davies

CISO, Equifax UK

Speaker

Pedro Tavares

Lead Data Scientist, Glencore

Speaker

Jeremy Grant

Managing Director, Technology Business Strategy, Venable LLP

Speakers

Thought Leaders on Stage Leading Deep-Dive Discussions

ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats.

Agenda

 

Opening Comments

9:55 - 10:00 SGT

10:00 - 10:30 SGT

Resilience and Trust at AI & Cybersecurity's Crossroads

Artificial intelligence is transforming cybersecurity, presenting both new strengths and potential weaknesses.

This session will explore how AI can be utilized to enhance organizational resilience, while addressing the associated challenges in threat detection, response, and human involvement.

Purk will discuss the evolution of AI-driven security measures to counter emerging cyber threats and consider the interplay between human factors and algorithmic precision. The discussion will offer practical insights into responsibly leveraging AI for sustainable digital security, addressing risks of automation and maintaining human trust.

Key Takeaways:

  • AI’s Role in Strengthening Cyber Defenses: How AI can provide scalable, proactive threat detection while maintaining the agility to adapt to new attack methods.
  • Human Impact and AI in Security: The role of human oversight in managing AI-driven security and how organizations can mitigate human-centric vulnerabilities.
  • Navigating Ethical and Operational Challenges: Balancing AI’s potential with the ethical and security implications of automated decisions within critical infrastructure.
  • Foundations for an AI-Resilient Security Strategy: Key strategies for developing a security framework that integrates AI responsibly, upholds trust, and builds adaptability.

Mary Purk,Co-Founder and Former Director, AI at Wharton,

The Wharton School of Business

Brian Brackenborough,CISO, Channel 4

10:30 - 11:00 SGT

Secure AI 2025: Lessons We've Learned

AI in 2025 is a far different landscape than it was when Chat GPT was introduced in 2023. As a result, the term "Secure AI" has new meanings as well.

In this session, Dr. Anton Chuvakin of Google Cloud shares insights on:

  • The AI security issues we should be discussing in 2025
  • Lessons learned over the past three years
  • Today’s practical and effective AI use cases

Anton Chuvakin, Senior Staff Security Consultant, Office of the CISO,

Google Cloud Security

11:00 - 11:30 SGT

TRACK A: AI Value Simplified: Communicating Impact and ROI to the Board​

As AI initiatives become essential to business operations, boards are increasingly focusing on their impact and ROI.

Despite the demonstrated value of AI, especially Generative AI, conveying its benefits to the board effectively remains a significant challenge.

TRACK B: Integrating AI Into Cybersecurity Operations: The Way Forward

The adoption of AI-powered applications is accelerating rapidly, challenging cloud security professionals to keep pace with robust protections.

For cybersecurity practitioners, the key challenge has been building effective processes to integrate AI into their cybersecurity operations and managing AI sprawl to ensure governance structures meet stringent AI security and privacy regulations.

The session will cover:

  • Key components of an AI governance structure and its impact on cybersecurity;
  • Understanding unique security risks that AI-powered applications introduce;
  • Methods to make AI ubiquitous across the organization to build cyber resiliency.

For cybersecurity practitioners, the key challenge has been building effective processes to integrate AI into their cybersecurity operations and managing AI sprawl to ensure governance structures meet stringent AI security and privacy regulations.

  • Key components of an AI governance structure and its impact on cybersecurity;
  • Understanding unique security risks that AI-powered applications introduce;
  • Methods to make AI ubiquitous across the organization to build cyber resiliency.

Wan Roshaimi Bin Wan Abdullah, Chief Technology Officer, CyberSecurity Malaysia

11:30 - 12:00 SGT

TRACK A: Mitigating AI Supply Chain Risks

The increasing reliance on third-party AI tools and services introduces significant and complex supply chain risks that can jeopardize an organization's cybersecurity posture.

These risks are particularly acute in industries where operational technology (OT) and informational technology (IT) converge, making the entire ecosystem vulnerable to attacks originating from third-party vendors.

TRACK B: Building an AI Governance Framework: Essential Steps

Organizations today face the challenge of creating effective AI governance frameworks that define AI's role and application within specific functions.

While AI’s automation capabilities enhance efficiency and innovation, they also introduce significant challenges related to accountability, transparency and ethical considerations. In absence of proper AI governance, there is a heightened risk of privacy breaches, biased algorithms and the malicious exploitation of AI technologies.

  • Developing standards and guidelines for responsible AI design, development and deployment;
  • Determining appropriate human involvement in AI-augmented decision-making;
  • Building effective governance structures to enable security professionals to leverage AI confidently in risk assessment and threat response.

Charmaine R.A. Valmonte, CISO Aboitiz Equity Ventures Inc
Mario Demarillas, Board of Director, CISO and Head of IT Consulting & Software Engineering, Exceture Inc
David Siah, Vice President, South East Asia-Australia, Centre for Strategic Cyberspace & International Studies

12:00 - 12:30 sgt

AI vs. AI: the Battle for Cybersecurity's Future

In the rapidly evolving landscape of cybersecurity, artificial intelligence is both a powerful ally and a formidable adversary.

Join Tim Morris for an engaging fireside chat on the transformative role of AI in modern security strategies. From AI-driven threats like deepfake phishing and adaptive malware to groundbreaking innovations in real-time visibility and continuous compliance, this session will explore how organizations can stay ahead in the battle between attackers and defenders.

The session will share insights into closing the external discovery gap, leveraging AI to move from reactionary incident response to proactive crisis management, and addressing ethical challenges like automation bias and AI governance. Walk away with actionable strategies to fortify your defenses, harness AI responsibly, and prepare for the future of cybersecurity. Whether you’re an IT leader, security professional, or innovator, this is a must-attend session to navigate AI’s transformative impact on information security.

Tim Morris, Chief Security Advisor, Americas, Tanium

12:30 -13:00 sgt

TRACK A: Building Stronger Defenses with AI

AI has become an essential component in enhancing cybersecurity defenses, offering capabilities that go beyond traditional methods.

By automating threat detection, predicting potential security incidents, and enabling more effective threat hunting, AI helps organizations stay ahead of increasingly sophisticated cyber threats. However, effectively deploying AI in cybersecurity requires overcoming challenges such as ensuring model accuracy, managing data, and integrating AI seamlessly into existing security operations. This session will explore the strategic and practical considerations for leveraging AI to build stronger, more resilient defenses, specifically addressing the needs of CISOs. 

TRACK B: Building an AI-First Organization: Realistic or Hype?

According to McKinsey, 72% of organizations have adopted AI in at least one business function.

Yet, despite widespread recognition of AI’s potential, many leaders struggle with implementation complexities. The feasibility of an AI-first approach depends on strategically integrating AI into core operations while addressing practical challenges – from driving measurable value and innovation to navigating organizational complexities. Leaders aiming to embrace AI at scale need actionable strategies for successful implementation.

  • Strategies for moving beyond pilot projects to fully integrate AI into core operations;
  • Methods to align AI initiatives with strategic objectives for measurable value generation;
  • Approaches to leverage AI for driving sustainable innovation.

Shishir Kumar Singh, Group Head of Information Security Advance Intelligence Group
Vinay Simha, Principal Enterprise Architect  – Enterprise and Data Architecture, Royal Philips
Matthias Yeo, Chief Executive Officer, CyberXCenter

13:00 - 13:30 sgt

TRACK A: Ethical AI in Cybersecurity: Ensuring Fairness and Transparency

As AI becomes deeply integrated into cybersecurity operations, it brings significant ethical challenges, particularly concerning fairness, transparency, and accountability.

The potential for bias in AI algorithms, often stemming from training data, can lead to discriminatory or unfair outcomes, such as biased profiling or misclassification of threats. The opaque “black box” nature of many AI systems complicates these issues, making it difficult to understand how decisions are made, which can erode trust and hinder accountability. This session will explore the critical ethical considerations of deploying AI in cybersecurity and provide strategies to develop and implement AI systems that are fair, transparent, and trustworthy. 

TRACK B: Accelerating Scams and Deepfakes in the AI Era: Building a Defense Strategy

Deepfakes are making a tremendous impact in compromising the credibility of information as well as the brand and individual.

It is a sophisticated weapon that is difficult to detect because proliferation of AI tools that are weaponized to create fake voice, content and profiles.

  • How to build your defense strategy against AI’s weaponization;
  • Developing a proactive crisis response to manage deepfake incidents;
  • Using AI to assess deepfakes risks;
  • Assessing the compatibility of the business privacy calculus framework with evolving technological landscapes and anticipate future privacy risks and opportunities

Mel Migriño, Southeast Asia Regional Director and Philippines Country Head, Gogolook

13:30 - 14:00 sgt

TRACK A: The Future of Digital Identity in an AI-Powered World

As the financial services sector faces a surge in AI-powered threats targeting identity and authentication systems, the U.S. Treasury Department’s 2024 Request for Information (RFI) marked a critical inflection point.

AI’s ability to mimic biometrics and exploit identity proofing tools is driving a rise in identity-related suspicious activity, accounting for nearly 75% of suspicious activity reports filed by banks. While AI presents new risks, it also offers promising defenses, such as AI-powered liveness detection for biometrics and risk analytics. Yet, these tools alone will not suffice in combating increasingly sophisticated AI-driven attacks.

TRACK B: Solving the Supply Chain Security Puzzle Through AI

As organizations get familiar with using AI applications to build cyber resiliency, they face significant challenges in addressing supply chain insecurities.

Supply chains are growing longer, involving numerous partners, multiple regions and a wide array of products. While these networks offer benefits like cost reduction and global reach, they also introduce significant cybersecurity risks.

Any disruption in the supply chain can have cascading effects, resulting in financial losses, reputational damage, and, in extreme cases, threats to national security. As traditional security measures prove inadequate, organizations are turning to artificial intelligence and machine learning (ML) solutions, though the implementation path remains complex and sometimes unclear.

  • Strategies for implementing AI-driven supply chain visibility and predictive analytics;
  • Methods for early detection and mitigation of supply chain vulnerabilities using AI;
  • Frameworks for ensuring accountability and validation in AI-based threat detection systems.

Sudhir Tiku, Vice President and Head – Asia Pacific and China, Bosch
Abid Adam, Group Chief Risk & Compliance Officer, Axiata

14:00 - 14:30 sgt

TRACK A: AI and Supercomputing: The Power of Duo Driving the Future of Tech

The collaboration of AI and supercomputing is creating a significant impact on the tech industry.

Supercomputing, with its immense computational power, is crucial for training complex AI models and processing enormous amounts of data at unprecedented speeds. This partnership has far-reaching implications, from accelerating scientific research to improving real-time analytics across various sectors. This session will delve into the fusion of AI and supercomputing, offering insights into the latest advancements, strategic advantages, and how to harness this powerful combination for innovation.

Key Takeaways:

TRACK B: Simplifying Threat Detection and Response Using AI

In 2024, advancements in artificial intelligence have resulted in increasingly sophisticated exploits by threat actors, such as deepfake technology used in misinformation campaigns and AI-powered phishing attacks that closely imitate legitimate communications.

Looking ahead to 2025, the use of AI in threat intelligence and automated response will undergo significant transformations, reshaping the tools, strategies and collaborative efforts aimed at combating advanced, AI-driven cyberattacks. Organizations need to adapt their security approaches to stay ahead of evolving threats while ensuring efficient and effective response mechanisms.

The session will cover:

  • How to develop predictive threat intelligence frameworks for proactive defense;
  • Methods for integrating AI-powered orchestration across security operations;
  • Best practices for implementing and scaling Detection-as-Code solutions.

Kunal Sehgal, Director, Virtual CISO, Security Decoded
Steven SIM Kok Leong, Chair, Advisory Committee, OT-ISAC

14:30 - 15:00 sgt

AI-Powered Cyber Attacks: Facing the Future of Threats

With the rise of AI-driven technologies, cyber attackers have begun to harness the power of AI to enhance the sophistication, scale, and success rate of their attacks.

These AI-enabled cyber threats are not just theoretical; they are already being deployed to automate tasks like vulnerability scanning, phishing, and even bypassing traditional security measures with unprecedented precision. This session will dive into how adversaries are using AI to craft more personalized, adaptive, and stealthy attacks that can outmaneuver conventional defenses. We’ll examine real-world examples of AI-powered attacks an discuss actionable strategies to anticipate and counter these evolving threats. 

Key Takeaways:

  •  Identify the New AI Attack Vectors: Gain insight into the latest AI-powered attack vectors, including deepfakes, AI-generated phishing emails, and autonomous malware, and how they differ from traditional cyber threats. 
  • Automation in Cybercrime: Understand how AI is automating and accelerating cyber attacks, enabling adversaries to conduct operations at a scale and speed previously unimaginable. 
  • Adaptive Defenses: Explore proactive defense strategies, including the integration of AI in threat detection, response, and intelligence gathering, to stay ahead of increasingly sophisticated AI-driven threats. 
  • Future-Proofing Security: Learn how to future-proof your organization’s cybersecurity posture by anticipating the next wave of AI-enabled cyber threats and developing resilient, adaptive defenses. 

Todd Covert, CISO, National General, Allstate

Giles Douglas, Director of Engineering, Security Privacy, and

Infrastructure, Grammarly 

15:00 - 15:30 sgt

Collaborating With AI To Enhance Security

As AI continues to integrate more deeply into cybersecurity operations, the role of human analysts must evolve to work in harmony with the automated applications they leverage.

This session will explore how AI and human expertise can complement each other, creating a more resilient and adaptive security framework. By leveraging AI’s analytical strengths alongside human intuition and contextual understanding, organizations can enhance their threat detection, response, and mitigation strategies. We will dive into best practices for designing workflows that maximize the strengths of both AI and human analysts, ensuring that your security team remains agile and effective. 

You Will Learn:

  • Combining AI and Human Expertise: Understand how to leverage AI’s analytical power and human intuition to enhance threat detection and response capabilities. 
  • Optimizing Workflows: Learn how to design workflows that seamlessly integrate AI tools with human expertise, maximizing the strengths of both. 
  • Training Your Team: Discover best practices for training and adapting your security team to work effectively alongside AI, fostering a culture of collaboration and continuous learning. 

Arielle Baine, Chief of Cybersecurity, Region 3, U.S. Department of

Homeland Security

Mario Rivas, CISO, Seguros Monterrey New York Life

15:30 - 16:00 sgt

Readying the Underlying Technology Infrastructure for Gen AI Adoption

While generative AI is on the agenda of all major organizations, the legacy systems and the underlying technology architecture may not always be conducive to its adoption.

For the success of Gen AI adoption, organizations must ensure that their IT infrastructure can support AI initiatives, including data management systems, computing power, and integration capabilities. 

The session will delve into the foundational elements required to build and maintain an AI infrastructure that can scale effectively with increasing data volumes, computational demands, and evolving business needs. It will cover the best practices for integrating scalable computing resources, data management systems, and robust architecture frameworks to ensure long-term AI success. 

Key Discussion Points: 

  • Assessing the current AI infrastructure for implementing and scaling generative AI.
  • Building a robust data architecture, including data storage, processing, and real-time analytics.
  • Role of cloud to address the compute resources to support gen AI workloads. 
  • Advanced security and compliance measures to protect sensitive data and AI models. 
  • Addressing technology integration and change management issues. 

John Chan, Director of Technology – AI/ML, Raymond James

Aaron Hand, Chief AI Officer, Arcelor Mittal

 

 

 

Closing Comments

16:00 - 16:05 SGT