AI Summit
Sunday, Oct 26
Yucatan 1-3
Agenda
8:30 am - 8:45 am Welcome Remarks
The AI Advantage in the Great Cyber Race

As the “Great Cyber Race” accelerates, artificial intelligence is emerging as both a powerful accelerator and a formidable challenge.

This opening session will set the tone for the summit’s journey. Don’t miss this opportunity to explore how AI is transforming security, reshaping competition, and redefining what it takes to stay ahead.

8:45-9:30 am Opening Keynote Panel Discussion
AI Is Moving Fast, but So Are the Risks. Are You Ready?

In an era where artificial intelligence is rapidly transforming business landscapes, organizations face an unprecedented challenge: how to harness AI’s transformative power while maintaining robust security and governance.

This panel of brings together leading cybersecurity experts to unpack the critical strategies for building resilient AI ecosystems.

Drawing insights from real-world case studies on secure AI deployment, our panelists will explore:

  • The shared responsibility model between AI providers and enterprises.
  • Practical frameworks for cross-functional AI governance.
  • Tactical approaches to mitigating AI-specific security risks
  • Balancing innovation with comprehensive risk management

 

You will learn how to create AI governance structures that protect their organization’s data, reputation, and competitive edge, transforming AI security from a potential liability into a strategic advantage.

9:30-10:00 am Session
Objection! AI Security Mistakes on Trial with Kubernetes & Confidential Computing

Enter the courtroom of cloud-native justice, where the most pressing AI security mistakes are put on trial.

From exposed sensitive data to flawed model training and insecure pipelines, the prosecution will lay bare the vulnerabilities threatening AI deployments. But don’t worry—Kubernetes, confidential computing, and other powerful open source projects will take the stand to defend your AI infrastructure.

Learn how these technologies work together to enforce robust security guardrails, protect sensitive data, ensure compliance, and mitigate the risks that come with AI operations.

This session blends technical depth with courtroom drama to help you identify, understand, and address common AI security mistakes, so you can build secure, scalable AI pipelines with confidence. Join us for a verdict that ensures the protection of your AI workloads!

10:00-10:30 am Morning Break

Take a moment to recharge, connect, and build new relationships with fellow attendees. This is your opportunity to share insights, exchange ideas, and expand your professional network in a relaxed, collaborative setting.

10:30-11:00 am Session
Artificial Intelligence: A Legislative & Regulatory Update of State & Federal Actions in 2025

State lawmakers filed nearly 500 AI-related bills in 2024 with Colorado, California, Illinois, and Utah passing notable laws. With state lawmakers emboldened by federal inactivity at the beginning of 2025, the first two months of the year forecasts even more state activity the rest of this year.

Regulatory agencies such as the California Privacy Protection Agency are considering AI-related rulemaking, and NY’s governor has directed the state’s Department of Labor to amend the WARN ACt regulations regarding layoff disclosures are related to the use of AI. These types of regulations will have significant impact on businesses.

AI and Data Privacy attorneys will review the notable developments from 2025, describe the areas of commonality across the patchwork of state AI laws, and offer a preview of what to expect in 2026.

11:10 am-12:00 pm Session
AI is Just Math....Not Your Future Overlord

Artificial intelligence is often discussed as if it were a sentient force that violates privacy, takes jobs, or reshapes society on its own. But in reality, AI is a collection of mathematical algorithms that reason, learn, and act on patterns in data. When Target predicted a customer’s pregnancy, it wasn’t an all-knowing machine, it was algorithms analyzing buying habits. When a medical AI produced biased outcomes, it wasn’t malice, it was missing attributes in training data.

This session will cut through the hype and fear to explain what AI really is, how it works, and where the true risks lie. We’ll break down the components of an AI model—algorithms, data, attribute selection, and security—and explore the categories of AI, from machine learning and computer vision to robotics and generative AI.

During this session you will:

  • Understand the foundations of AI: What it is (and isn’t), how algorithms and data shape outcomes, and why context matters.
  • Recognize real risks vs. hype: Bias, privacy, and workforce impact explained without fear, uncertainty, and doubt.
  • Apply AI knowledge effectively: Learn how to evaluate AI models, address security and ethical concerns, and make informed policy or business decisions.
12:00-1:00 pm Lunch

Enjoy a relaxed lunch while connecting with peers, sharing insights, and building new relationships across the cybersecurity community.

1:00 -1:50 pm Session
May the Code Be Secure: AI’s Role in Shaping the Future of DevSecOps

We’ll explore how AI serves as a powerful ally in the DevSecOps galaxy.

Together, we’ll journey through the key areas where AI can support and enhance your efforts—from aiding in threat modeling to streamlining secure code creation, improving automated testing and optimizing real-time monitoring.

Along the way, we’ll discover how to integrate this technology into our workflows, not as a replacement for our expertise, but as a tool to make our work more effective, efficient, and enjoyable.

So, grab your lightsabers (or laptops), ready your droids (or automation tools), and prepare to leverage the Force of AI as we embark on The Path of the DevSecOps Jedi: AI’s Role in Securing the Future. May the Force be with us!

2:00 - 3:00 pm Panel Discussion
Agentic AI & Security's Human Firewall: Forging a Culture of Cyber Resilience in the Age of Autonomous Agents

Agentic AI requires changing how we build security-first organizations.

This panel of Chief Human Resources Officers (CHROs) and AI/cybersecurity attorneys explores the critical intersection of HR, legal, and cybersecurity in a world where AI agents act autonomously.

We’ll delve into restructuring for AI integration, focusing on how HR leaders and CISOs can drive a culture of security from the boardroom to every AI-powered interaction. Legal experts will dissect evolving regulations and liabilities, particularly concerning AI governance.

Legacy outsourcing and offshoring paradigms and background screening for human employees provides context for Agentic AI cybersecurity governance.

The panel will discuss how to foster transparency, accountability, and explainability in human-Agentic AI interactions and to ensure that AI agents reflect a security-first ethos. Learn how to win with peers and partners by aligning legal, HR, and security strategies to navigate the complexities of AI-driven transformation.

3:00-3:30 pm Afternoon Break

Take a moment to recharge, connect, and build new relationships with fellow attendees. This is your opportunity to share insights, exchange ideas, and expand your professional network in a relaxed, collaborative setting.

3:30-4:00 pm Session
Coming soon!
4:00-4:15 pm Closing Remarks
Crossing the Finish Line: Reflections on the AI Advantage in the Great Cyber Race

In these closing remarks, we’ll revisit the insights and strategies shared throughout the summit, highlighting how AI is transforming security, reshaping competition, and redefining what it takes to stay ahead.

Attendees will leave with renewed energy, actionable ideas, and a stronger sense of community to carry forward in the race to secure the future.

Why attend the AI Summit?

AI is more than a shiny new tool—it’s a force multiplier that’s reshaping how we think about security architecture, access control, and digital identity. But as the tech evolves, so do the threats, the responsibilities, and the opportunities.

This summit isn’t just about keeping up—it’s about building what’s next.

You’ll discover:
How to prepare for
oncoming AI attacks
How to future-proof your identity ecosystem against AI-generated attacks and synthetic behaviors
Frameworks for
long-term resilience
Frameworks for evaluating and deploying AI in your IAM strategy with agility and long-term resilience
Strategies to
evolve as threats do
Strategies for building adaptive, intelligence-driven defense postures that evolve as threats evolve
Navigating AI
regulations + more
Guidance for navigating the emerging intersection of AI, regulation, and digital trust
Case studies on
what’s next
Case studies that show how organizations are architecting AI into their security stack today—and where they’re headed next
Summit Access Eligibility

Access to the Summit is exclusive to attendees who have purchased a Full Conference Pass.

  • Expo Pass holders are not eligible to attend Summit sessions or participate in exclusive Summit activities.

This policy ensures that Summit content and experiences are reserved for participants fully invested in the event.

key topics cybersecurity leaders must explore
1. AI as an Identity Risk:
How AI-generated identities and behavior spoofing challenge existing defenses
2. AI-Augmented Threats:
Understanding deepfakes, intelligent phishing, and autonomous cyberattacks
3. AI in IAM Operations:
Automating identity lifecycle management with intelligence and precision
4. Adversarial AI and Defense Tactics:
Protecting AI models and defending against AI-driven exploits
5. Trust and Transparency:
Building explainable AI systems that meet governance and compliance requirements
6. AI-Driven Anomaly Detection:
Enhancing insider threat programs with behavioral modeling
7. Securing the AI Stack:
From LLMs to APIs, what it takes to protect AI infrastructure
8. AI + Zero Trust:
Strengthening continuous verification and risk-based access through machine learning
9. AI and Regulatory Readiness:
Meeting evolving privacy, security, and AI governance requirements through proactive design
10. Human-AI Collaboration in Security Operations:
Pairing analyst expertise with machine intelligence to accelerate detection and response
Get in touch
Get in touch
Customer Service
For any and all inquiries please click the button below
Speaking Opportunities

Kris Tanaka
VP, Event Programming

InfoSec World
Stay Informed
Join our mailing list for the latest news on InfoSec World 2025.