Speakers and Abstracts - ISED 2024
Medhi Famibelle, Akabi
Bio: Medhi Corneille FAMIBELLE is an Artificial Intelligence Engineer with experience in semantic analysis of social networks. He specializes in guiding companies through the deployment of AI technologies, particularly large language models (LLMs). With an understanding of both the technical and practical aspects of AI, Médhi helps organizations leverage these tools to enhance their operations.
Abstract: LLM Adoption and Security Risk
Catalin Tigalina, ISACA
Bio: Catalin is a consultant and auditor with experience in IT and Information Security Risk Management, Cyber Security, Cloud Security, IT Governance, IT Risk Management, IT Compliance, AI GRC, IT Audit and in Data Privacy. With more than 20 years practice in delivering advisory and audit engagements, as part of Deloitte (LU and RO), KPMG (RO), Grant Thornton (LU) and Mazars (LU), Catalin delivered numerous projects as part of international teams in different geographies (Luxembourg, Germany, Romania, Moldova, Bulgaria, Albania, Croatia, Jordan and Pakistan) covering a wide range services in diverse industries: finance and banking, technology, telecommunication, start-ups, energy, healthcare, retail and manufacturing.
Abstract: The AI Risk Management Program proposed by ISACA Luxembourg Chapter facilitates the implementation of a solid AI governance and control framework. The program reflects on the swift adoption of AI technologies like LLMs and the challenges posed by inadequate management awareness and infrastructural deficiencies and emphasizing the urgent need for improved oversight and control in the AI domain.
The program defines a comprehensive AI risk framework that encapsulates legal, regulatory, and governance concerns, along with specific risk categories related to AI. Through detailed control objectives and activities, the program lays out a structured approach to managing AI risks, providing a robust mechanism that aids organizations in preparing for AI system compliance readiness and ensuring alignment with ISACA digital trust principles.
Mohamed Fawzi, Google
Bio: Security and Compliance lead at Google Cloud. A seasoned professional with an undeniable cool factor. His job is to navigate the intricate world of digital defense with finesse and expertise, safeguarding organizations with an unwavering commitment to security and compliance.
Abstract: (AI) is rapidly becoming a ubiquitous part of our lives. From powering our smartphones to driving our cars, AI is already having a major impact on the way we live and work. Join us for an insightful session on securing AI systems in an increasingly AI-driven world. Explore the potential vulnerabilities of AI systems, from malicious data manipulation to system hijacking, and understand the implications for security, privacy, and safety. Let's navigate the path to secure and responsible AI implementation together.
Johann Alessandroni, Excellium Services
Bio: Johann Alessandroni, a professional with over a decade of experience in the cybersecurity field in Luxembourg, possesses a versatile skill set that spans high-level strategy formulation to hands-on implementation of security measures. With expertise in security auditing, risk management, and business continuity, Johann has successfully led organizations through complex projects and attained certifications such as ISO 27001. He has also played a pivotal role in the establishment of Luxembourg's information security certification body and managed compliance for numerous companies globally. Currently serving as the head of the Information Security Governance team at Excellium Services, Johann leads a team of over 30 consultants, as well as driving information security initiatives and developing innovative approaches to meet clients' needs worldwide for Thales Group. With fluency in French and English, Johann is a sought-after speaker at cybersecurity events, teacher in Master 2 course at the University of Lorraine (France) and the University of Luxembourg, contributing his insights on strategy, risk management, and best practices in the industry.
Abstract: The session is focused on the challenges about development of AI systems and how cybersecurity concerns can be considered. To this end, we present our approach regarding how to assess risks (cybersecurity related, but not only) and how to define a roadmap for protecting AI systems in line with our tailor-made cybersecurity framework.
Teodora Ciungan, Amazon
Bio: Theodora is a Principal Security Leader at AWS, where she is responsible for the secure operation of the EMEA Professional Services organization. With 15+ years of experience, she specializes in building and leading large-scale security programs, with a particular focus on data protection. Her passion lies in empowering teams to defend against cyber threats by fostering a culture of shared responsibility, where security is everyone’s job. She holds multiple Cloud Security certifications (ISC2, Azure, AWS), an MBA and a B.Sc. in Computer Science.
Abstract: In the realm of modern cybersecurity warfare, the landscape of advanced techniques is evolving at an accelerated pace. In this talk, we will talk about how IT/SoC teams AI based AWS services and their capabilities to bolster overall cybersecurity defences. We discuss how they identify threats amidst billions of users and help industry-leading companies enhance security by uncovering vulnerable configurations and potential high-risk attacking paths.
Anusha Moonshiram, Women Cyber Force
Bio: Anusha is an advisor at the High Commission for National Protection, a body that falls under the responsibility of the Prime Minister and Minister of State in Luxembourg. She works on TEMPEST and on Information Security for New Information and Communication Technologies, and currently on AI. Anusha was born in the paradise island of Mauritius. She left her Motherland as an International Scholar for her Bachelor and Master of Science at Tufts University in Massachusetts under a full US scholarship. She then went on to get her PhD in Engineering Sciences, conceiving and designing a phased array antenna with dielectric phase shifters, the science behind 5G beamforming. She has written 2 patents and 21 scientific publications. She enjoys learning and speaking various wonderful languages including Luxembourgish. Traveling and understanding the world under different perspectives are her passions that have led her to live and work in many countries. She is an advocate for inclusion and diversity. She additionally has a very special dedication for the differently abled and for those with special needs. During her career in the States, she created the Intel Ladies Group to encourage networking and support of women. She has been an active member of the Society of Women Engineering. She has also guided and mentored women to pursue careers in STEM fields under the umbrella of the International Telecommunication Union (ITU), the United Nations specialized agency for information and communication technologies.
Abstract: I and cybersecurity present a dynamic interaction of challenges and opportunities. This presentation examines the evolving cyber landscape along with the market size and duality of AI in cybersecurity. AI is advancing very rapidly, and it creates multifaceted challenges for cybersecurity. Deepfakes, for example, demonstrate how AI can deceive professionals, by impersonating authority figures and manipulating human trust. Yet at the same time, AI is also emerging as our formidable ally in defending against cyber threats. When deployed ethically and managed securely, AI's functions in cybersecurity promise invaluable support in protecting our digital ecosystems.