Call for Presentations

in 100 days

AI Risk Summit 2025

event starts

19 Aug 2025

event ends

20 Aug 2025

location

Ritz Carlton Half Moon Bay Half Moon Bay, California, United States


SecurityWeek's AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and other business and government stakeholders to delve into the risks of deploying generative and predictive AI tools in the enterprise, the threat from adversarial use of AI technology and deep fakes, and preparation for the inevitable compliance and regulations from policy makers.

Hosted at the stunning Ritz-Carlton, Half Moon Bay, California, this event hosts some of the biggest names and brightest minds in technology and AI, and will feature keynotes, panel discussions, fireside chats, advanced research, and technical presentations showcasing eye-opening examples of AI in action.

After the conference, get ready to have some fun and play in the SecurityWeek Golf Classic  at the Half Moon Bay Golf Links on August 21st.

In addition to the AI Risk Summit, SecurityWeek will host it's CISO Forum, which will take place concurrently at the Ritz-Carlton.

open, 6 days left
Call for Presentations
Call opens at 12:00 AM

01 Mar 2025

Call closes at 11:59 PM

16 May 2025

Call closes in Pacific Daylight Time (UTC-07:00) timezone.
Closing time in your timezone (UTC) is 17 May 2025 6:59 am.

Official Call for Presentations/Papers (speakers) for SecurityWeek’s 2025 AI Risk Summit, being held August 19-20, 2025 at the Ritz-Carlton Half Moon Bay.

Tips for Acceptance:

  • Present In-Person – Presenters must be available to present IN-PERSON and be able to travel to Half Moon Bay, CA (USA) for the event which takes place August 19-20, 2025.
  • Be Original – Proposed talks should be original and not have been presented prior at other events. We are looking for new, innovative talks that have not been seen elsewhere.
  • Submit Early – By submitting early, you will have a better chance of being accepted, as submissions will be reviewed on an ongoing basis.
  • Not a Sales Pitch – Sessions should be educational and NOT be a masked sales pitch. 
  • Submissions will be reviewed on an ongoing basis so early submission is highly encouraged.

Most sessions will be a mix of 30 and 45-minute talks including time for Q&A.

We invite submissions for presentations that provoke thought and provide actionable insights in areas, including, but not limited to:

Adversarial AI & Deepfakes:

  • Exploiting AI for malicious purposes
  • National security implications
  • Strategies to combat misinformation and brand damage

Protecting Sensitive Data in AI/ML Models:

  • Safeguarding against cyber threats and hacking
  • Preventing data breaches and information theft
  • Ethical manipulation of AI systems

AI Integration Roadmap Planning:

  • Incorporating AI in enterprise risk management
  • Protecting intellectual property
  • Cybersecurity strategy development

AI Failures and Rogue AI Mitigation:

  • Analyzing AI system failures
  • Real-world case studies
  • Risk mitigation strategies
  • AI Ethical Debates
  • Addressing privacy, bias, and critical decision-making

AI for Defense

  • Case studies on AI in risk mitigation and security enhancement
  • Solutions for complex security challenges

AI and Data Integration:

  • Handling and analyzing massive datasets
  • Big data architectures and cloud computing
  • Privacy in AI analytics

Regulatory Challenges:

  • Policy development for AI advancement
  • Balancing public interest with innovation
  • International regulatory cooperation

Submissions must include proposed presentation title, an informative session abstract, including learning objectives for attendees if relevant; and contact information, headshot and bio for the proposed speaker.

All speakers must adhere to the 100% vendor neutral / no commercial policy of the conference. If speakers cannot respect this policy, they should not submit a proposal.

Tickets - For security/technology vendors submitting any sessions with more than one speaker proposed, the cost of one speaker will be covered to attend the event. Any additional proposed speaker(s), if accepted, will be required to purchase a ticket to attend the conference.


event fee

free for speakers

For security/technology vendors submitting any sessions with more than one speaker proposed, the cost of one speaker will be covered to attend the event.


Login with your preferred account


If you haven't logged in before, you'll be able to register.

Using social networks to login is faster and simpler, but if you prefer username/password account - use Classic Login.