AI-driven Cybersecurity

Security Innovation Forum

September 9, 2025 - Sunnyvale, CA

Google Cloud Customer Reviews 2025 | Cloud Management

Visionaries

Marc Mackey Nike
Marc Mackey

Global IT Director

Nike

About Me

• Accomplished Technology executive with over 20 years experience leading portfolio / program / release / project management operations in both high-growth startups and large enterprise software companies with documented success in critical roles. • Built a business value driven, high performing, cross-functional PMO with geographically distributed PMO/TPM teams. • Specializes in driving business value by aligning all levels of leadership and cross-functional teams through the implementation of OKRs (Objectives and Key Results) and KPIs (Key Performance Indicators) based framework and tools. • Recognized for improving customer satisfaction by standardizing processes, procedures and removing inefficiencies to eliminate downtime. • Increased productivity by fundamentally re-architected how Product Development teams and people align and collaborate at all levels. • Experienced public speaker, reporting to C-level executives with solid strategy and presentation skills. • FDIC and OCC presence and presentations for National Bank Charter for Technology.

Stephen Chen NuCompass Mobility Services
Stephen Chen

CTO, SVP of Security

NuCompass Mobility Services

About Me

Stephen Chen is an entrepreneurial technologist with a demonstrated track record of developing innovative solutions that strategically align business objectives with cutting-edge technology. His expertise spans a range of domains, including data science, software engineering, cybersecurity, and digital marketing. With a rich background encompassing defense, commercial, and nonprofit sectors, Stephen brings a diverse skill set and operational excellence to the table. His unique blend of experience instills the discipline of large organizations into startups while reintroducing the agility of startups to larger enterprises. In addition to his corporate endeavors, Stephen has garnered significant exposure in board and advisory roles, particularly in the nonprofit and educational sectors. He has served as a board member and currently holds an advisory position for Here To Serve, a nonprofit dedicated to supporting families facing childhood cancer. Stephen maintains an active involvement in local schools, exemplified by his advisory council for the cyber security program at California State University, Chico.

Khalid Turk County of Santa Clara
Khalid Turk

Chief Healthcare Information Officer

County of Santa Clara

About Me

I am an experienced executive IT leader, with over two decades of experience in the healthcare IT sector, with a keen focus on strategic, operational, and growth initiatives. My journey showcases consistent growth, moving from hands-on technical roles to leading Information Technology divisions. I have had the privilege of constructing and directing highly efficient teams to execute projects and initiatives of varying scales. This has included tasks as diverse as implementing Electronic Medical Record systems to launching new hospitals and clinics. My accomplishments as a healthcare technology leader include the successful implementation of tech solutions that enhance operational efficiency and curtail costs. I am recognized by customers, peers, and team members as a kind, compassionate, and inspiring leader who cultivates consensus and delivers outstanding results across all domains of a healthcare system.

September 9, 2025

Agenda

All times Pacific Time

9:00 AM-9:30 AM

Registration


9:30 AM-10:30 AM

Breakfast & Morning Networking


10:30 AM-10:35 AM

Opening Remarks


10:35 AM-11:10 AM
Keynote

Securing the Future: How AI is Revolutionizing Cloud Security

As organizations accelerate their cloud adoption, the complexity and scale of cyber threats are evolving just as rapidly. Traditional security approaches struggle to keep pace with the speed and sophistication of modern attacks. Enter AI—the game-changer in cloud security.

This keynote will explore how AI-driven security solutions are transforming threat detection, risk mitigation, and compliance in the cloud. From predictive analytics that identify vulnerabilities before they are exploited to automated incident response that reduces dwell time, AI is redefining how businesses protect their most valuable digital assets. Join us to discover how organizations can harness AI to build a resilient, future-ready cloud security strategy that balances innovation with risk management.


11:15 AM-12:00 PM
Keynote Panel

Building Cyber Fortitude: CISO Strategies for Resilient Cybersecurity

In the realm of building cyber resilience, organizations confront increased risk exposure amidst bold moves and evolving external challenges. Despite investments in technology and data, risk leaders, including CISOs, express difficulty in keeping pace with the persistent threat of cyber crises. However, in today's business landscape, discussions of digital transformation or reinvention are inseparable from considerations of cybersecurity. Looking ahead, stakeholders, from the board to frontline cybersecurity operations, pose critical questions about resiliency. This includes inquiries about the adequacy of efforts to safeguard the company and its customers in the face of cyber attacks. The focus shifts to identifying opportunities to minimize the impact on business and shareholder value through effective threat response. Embracing cybersecurity as a whole-of-business endeavor, organizations are urged to align themselves with business owners, adapting to changes in the cyber landscape and fortifying resilience against disruptions. Building confidence in the cybersecurity program becomes paramount in navigating the dynamic and challenging cyber landscape effectively.


12:00 PM-12:30 PM

Networking Break


12:15 PM-1:00 PM
Panel

Cybersecurity Leadership in the Era of AI and ML: Navigating Innovation and Responsibility

In the dynamic realm of artificial intelligence (AI) and machine learning (ML), CISOs play a pivotal role in leveraging these advancements for enhanced cybersecurity. Strategic integration of AI and ML is essential for bolstering security measures, optimizing decision-making, and driving innovation. CISOs must adopt a comprehensive approach, considering the entire lifecycle of these technologies to ensure both efficiency and ethical use. Establishing robust governance frameworks becomes paramount, addressing biases, ensuring transparency, and minimizing unintended consequences.

Looking ahead, as AI and ML continue to advance, CISOs face evolving challenges and regulatory considerations. Proactive engagement involves staying informed about changing regulations, particularly in areas such as data privacy and ethical AI practices. CISOs should strive for a tech-enabled understanding of AI and ML systems, encompassing deployment, impact, and security measures. This approach positions organizations to navigate the regulatory landscape effectively, ensuring responsible and competitive integration of AI and ML into cybersecurity strategies.


1:10 PM-2:30 PM

Lunch & Networking


2:30 PM-3:00 PM
Disruptor

Cyber Arms Race: Fortifying Cyber Readiness Against Ransomware Attacks

Let's dive into the intersection of AI, the cyber arms race, and ransomware resilience. Ransomware attacks continue to escalate, inflicting substantial financial losses, data breaches, and tarnished reputations across sectors. As we navigate through 2024, businesses must comprehend the true implications of these attacks within their operational context. Despite achieving cybersecurity compliance, vulnerabilities persist, necessitating a deeper understanding of ransomware's impact and broader strategies for mitigating overall cyber risk exposure. Advanced AI technologies are shaping both offensive and defensive cyber strategies, offering proactive threat detection, comprehensive risk management frameworks, and insights to fortify cybersecurity posture against ransomware and beyond. Don't miss this opportunity to fortify your defenses and stay ahead in the AI-powered cyber landscape.


3:05 PM-3:35 PM
Disruptor

The Race Against Threats: Speed & AI in Exploitation

Organizations’ attack surfaces, IT complexity, and reliance on third parties have increased exponentially, making effective security governance and operations a significant challenge.

Meanwhile, the frequency and damage of attacks are increasing, making reactive security strategies are no longer economically viable.

Key points:

  • How AI is accelerating the development of exploits.
  • An analysis of vulnerabilities and exploits that challenge the scale and speed of traditional security operations.
  • Security strategies need to transform and focus on proactive and preemptive measures.

3:35 PM-3:45 PM

Closing Remarks Google


4:00 PM-5:00 PM

Cocktail Reception


Together With