Home Events RSA Conference IBM at RSA Conference 2024
See what happened at the event
Cybersecurity in the era of generative AI 2024 Threat Intelligence Index
Dot texture with a blue to purple gradient
Securing AI: Protecting the pathway for innovation

This year's conference explored the ways emerging AI capabilities are changing the pace and trajectory of innovation in cybersecurity. Learn why it's imperative for enterprises to have AI at the center of their security strategy. 

Organizations must apply a security framework around their generative AI strategies, central to which are data security and identity and access management. At the same time, generative AI can be a pivotal tool against attackers, helping maximize the security team’s time and talent, accelerate organizations’ threat detection and response capabilities, and dynamically secure user access to today’s distributed enterprise environments. 

As a leader in cybersecurity software across threat, data and identity, and with industry-leading cybersecurity services delivered by IBM Consulting Cybersecurity Services and X-Force, IBM is the trusted partner to enable your cybersecurity strategy for the AI era. See the recorded sessions below.

    How AI can maximize your cybersecurity budget and talent

    Read why 84% of executives plan to prioritize generative AI cybersecurity solutions.

    Know your threats

    USD 4.45 Million was the global average cost of a data breach in 2023

    50% is the AI market share milestone that will incentivize cybercriminals to invest in developing cost-effective tools to attack AI technologies

    RSA Sessions
    KEYNOTE: Securing New Limits: Protecting the Pathway for AI Innovation  

    Generative AI introduces game-changing opportunities for enterprises, but also a sense of urgency to secure this new frontier. With existential business data and critical IP moving closer to the surface, organizations have a heightened responsibility to safeguard their entire AI lifecycle against current and emerging security risks, while also exploring how they can use these innovations to their advantage.

    Speakers:

    • Kevin Skapinetz, Vice President, Security Strategy, IBM
    • Rosa Bolger, Distinguished Engineer and Vice President of Cyber Defense and Technology, IBM
    Learn more

    PARTNER SESSION: Innovate Now, Secure Later? Decisions, Decisions…

    Businesses are rushing to benefit from AI, but it comes at a detrimental cost when security is an afterthought. They cannot afford to bring unsecured AI models and data into their environments, as attackers will undoubtedly target them for malicious gains. It’s paramount that businesses apply a holistic security framework and embed governance across their AI pipeline and underlying infrastructure.

    Speakers:

    • Mohamad Ali, COO, IBM Consulting
    • Srinivas Tummalapenta, Distinguished Engineer, CTO, IBM Consulting Cybersecurity Services
    • Ryan Dougherty, Program Director, Emerging Security Technology, IBM
    Learn more

    PANEL: Quantum Safe Computing for Telecommunications  

    This session will describe the Quantum threats to telecommunication systems. Explore the reality of the migration challenge facing operators and vendors for telecommunications and cryptography. An approach to a quantum-safe program of work and activities can keep customers and systems safe.

    Speakers:

    • Blair Canavan, Director, Alliances, Thales Group
    • Ray Harishankar, IBM Fellow, IBM Quantum, IBM
    • Paul Hopkins, Head of Global Cyber Strategy & Secure by Design, Vodafone
    • Moderator: Emma Smith, Chief Information Security Officer, Vodafone
    Learn more

    Thursday, 9 May at 9:40 AM PST Building Your Quantum-Safe Future with Crypto-agility

    As quantum computers advance, they will challenge many of the security protocols on which the modern digital economy relies. This session will present a framework for transitioning to quantum-safe cryptography with agility and will share practical learnings from client experiences.

    Speakers:

    • Jai Arun, Head of IBM Quantum Safe Product Management & Strategy, IBM
    • John Buselli, Product Manager—IBM Quantum Safe
    Learn more

    Thursday, 9 May at 1:30 PM PST PANEL: FUD vs. Reality: Bracing for an AI-Powered Threat Landscape

    Today’s AI maturity preludes the rise of an AI attack surface, but threat proliferation has historically lagged behind tech introduction, warranting that we take a pragmatic and sober approach to examining what AI-engineered threats aren't realistic threats in the near term that defenders need to prepare for and how historical events can help us project a timeline for AI threat maturity.

    Speakers:

    • Srinivas Tummalapenta, Distinguished Engineer, CTO, IBM Consulting Cybersecurity Services
    • Allison Wikoff, Director, Global Threat Intelligence—Americas Lead, PwC,
    • John Dwyer, Binary Defense
    Learn more
    IBM Theatre Sessions

    IBM featured a variety of thought-provoking sessions and expert discussions at the IBM theater on expo floor. See a snippet below.

    AI Data—Emerging from the Shadows

    Cloud computing introduced us to the idea of shadow data - but AI will introduce a even more critical issue: “Shadow AI.” Learn how to manage the potential growing sprawl of AI – and the sensitive data used to train it. The session will also current and emerging technologies designed to address the shadow AI and data challenge.

    Speakers:

    • Akiba Saeedi, VP, Data Security Product Management, IBM
    • Guy Shanny, Co-founder & CEO of Polar Security (an IBM Company)
    Identity Crisis: Logging into AI

    Access management has long plagued the industry as a point of failure in many security programs - with identity-based attacks serving as the top entry point for attackers last year, according to the latest X-Force Threat Index. As companies lean further into AI, the risks are even greater - as large language models create a single point of access to critical data for cyber criminals. Learn about these risks from an attackers perspective, as well as how to improve your identity and access management program for the AI era.

    Speakers:

    • Dustin Heywood, Chief Architect, X-Force at IBM
    • Wes Gyure, Director of Product Management, Identity and Access Management, IBM
    Put Your Model to the Test

    Red teaming of AI models is now emerging as a requirement from governments around the world as they look at protecting the new AI attack surface. Learn how a red team engagement for AI models differs from traditional test — including the background of the testers themselves.

    Speaker:

    • Chris Thompson, Global Head of X-Force Red, IBM
    Panel: Evolving Threat Management to Secure the AI Lifecycle

    AI represents a critical new attack surface - with new detection and response strategies required for threats such as model evasion, extraction, inference and poisoning. How can we harness AI-powered technologies today, to help better detect and respond to threats against AI as it becomes a growing target in the future? This panel discussion will also explore emerging technologies and approaches that are rising to address this new frontier, such as ML-Sec-Ops and ML Detection and Response.

    Speakers:

    • Sridhar Muppidi, CTO, IBM Security
    • Scott McCarthy, Vice President, IBM Consulting Cybersecurity Services
    • Chris "Tito" Sestito, CEO, HiddenLayer
    • Moderator: Sam Hector, Product Manager, Emerging Security Technology, IBM
    Bridging the Gap: CISO and Product VP’s perspective on Securing AI in the Enterprise

    As artificial intelligence (AI) becomes increasingly embedded in enterprise operations, the security of foundation models, generative AI systems, and their associated data sets is a top priority. In this fireside chat, we bring together two key players in the AI security landscape: IBM CISO Koos Lodewijkx, and Suja Viswesan, VP Product Development. Koos and Suja will share their distinct perspectives on the critical aspects of securing AI in the enterprise including essential defensive strategies required to protect AI assets, challenges of integrating security considerations into the AI product development process, and the importance of fostering a culture of security awareness within product teams.

    Speakers:

    • Koos Lodewijkx, IBM CISO
    • Suja Viswesan, Vice President, Security Product Development, IBM
    • Moderator: Sam Hector, Product Manager, Emerging Security Technology, IBM
    Harnessing AI to Maximize Security Team Time & Talent

    Explore how current and future applications of AI for security will change the game for security teams. The session will explore the evolving ways that humans and machines will work together in the AI era, with generative AI playing a key role to help elevate and upskill the security workforce.

    Speaker:

    • Chris Meenan, Vice President, Product Management, IBM Security
    Secure your business for the Quantum Era

    “Harvest now, decrypt later” attacks could enable adversaries to steal encrypted files and store them until more advanced quantum computers emerge. All data — past, present, and future — that is not protected using quantum-safe security is now a liability. In this session, we will discuss the approach you can take to equip your organization with a plan and execution strategy for agile transition to quantum-safe cryptography.

    Speakers:

    • Antti Ropponen, Global Partner, Data & Application Security Services, IBM Consulting
    • Jai Arun, Head of IBM Quantum Safe Product Management & Strategy, IBM Quantum
    Merging Security Risk and Governance in the AI Era

    Current and emerging regulations have created a new challenge for responsible AI implementation and usage across the enterprise, requiring deeper governance of the data, model, and managing privacy and usage of generative AI services. In this landscape, establishing and maintaining effective end-to-end enterprise cyber risk management and resiliency is a critical precursor to overall business risk oversight.  Companies will need to factor AI regulations into the governance models for understanding risk and reporting. Learn how to better connect your AI governance strategy to your cybersecurity and risk management strategy using an automated, risk-based approach for cyber resilience and risk management.

    Speakers:

    • Srini Tummalapenta, Distinguished Engineer, CTO, IBM Consulting Cybersecurity Services
    • Evelyn Anderson, Distinguished Engineer, CTO, IBM Consulting Cybersecurity Services

     

    Navigating Uncertainties for a Secure AI Journey (IBM+AWS)

    For many organizations innovation takes precedence over securing Generative AI, despite most business leaders considering it important to secure AI solutions before deployment. So where’s the disconnect? IBM’s Institute for Business Value has new insights into concerns, unknowns and uncertainties amongst the C-Suite, impacting how they seek to leverage Generative AI for their security needs, as well as what’s needed to secure their AI investments. This session will highlight gaps and opportunities that organizations are faced with when it comes to generative AI adoption, and how partnerships can propel their secure AI journey.

    Speakers:

    • Dimple Ahluwalia, Vice President, IBM Consulting Cybersecurity Services
    • Himanshu Verma, Head of AWS Security Go To Market, AWS
    Adversarial AI: Community-Driven Protections to Harden AI Models and Deployments

    Trust in AI hinges on our ability to safeguard these models and deployments against manipulation by attackers. What are the top ways adversaries might attempt to trick the machine learning pipeline to their advantage, and how can defenders get ahead of these threats today? Hear from the IBM Researchers developing new techniques, like "unlearning", for removing toxic language from models, pioneering an open source toolkit for developers guard AI against attacks: from manipulation of training data, to evasion threats that confuse AI models by inserting malicious data or manipulating objects the system infers.

    Speaker:

    • Nathalie Baracaldo, Manager, AI Security and Privacy Solutions, IBM Research
    Protecting your data and AI enabled applications with end-to-end data resilience
    On the Line: Integrating Mobile Devices into Enterprise Security

    Personal mobile phones and tablets have become indispensable tools for employees, blurring the lines between personal and professional devices. However, these devices have often remained invisible or managed separately from the enterprise network, creating potential security blind spots for Security Operations Center (SOC) teams. By bringing these historically unseen devices into the purview of SOC teams, organizations can gain comprehensive visibility and control over their entire network ecosystem. IBM and Samsung will discuss the challenges posed by the current siloed approach to mobile device management,  the benefits of a unified security strategy and practical steps to achieve this.

    Speakers:

    • Denny O'Brien, Director, Product Management, Cloud and Service Provider Security, IBM
    • Harsh Mantri, Product Strategy Lead, Global Mobile B2B Team, Samsung Electronics
    Tips, Tricks, and Trends for Building Cyber Resiliency in Your System Access Controls

    Cyberattacks continue to target system access controls. At the same time, IBM X-Force has observed a significant rise in identity-related attacks as an initial access vector over the past year. Safeguarding intellectual property, PII, critical infrastructure and supply chains has become an increasingly urgent concern for organizations amidst the rapid advancement of technologies including hybrid cloud, robotics, AI solutions, IoT, and OT. Attend this panel discussion with IBM identity access experts and IBM partners to gain best practices for how they have tackled this formidable challenge with leading organizations

    Speakers:

    • Dinesh Nagarajan, Partner, IBM Consulting Cybersecurity Services
    • Matthew Cass, Partner, IBM Consulting Cybersecurity Services
    • Amit Saha, Chief Growth Officer and Co-Founder, Saviynt
    • Simeon Utobor, RVP,  Sales Engineering Americas, Claroty

    Related content

    Cybersecurity in the era of gen AI ebook Download the paper
    2024 X-Force Threat Intelligence Index Cybersecurity in 2024: Exploiting the human attack surface & the shifting tides of cyber threats The power of AI: Security
    IBM Security

    We put security everywhere, so your business can thrive anywhere.

    Explore IBM Security Solutions