top of page


Conference Overview - Executive PRactice Guide
We are pleased to share our summary of the Advanced Cyber Security Center’s (ACSC) 15th Annual Member Conference, "Winning the Competition for Trusted AI: A Risk and Security Agenda," hosted by the Federal Reserve Bank of Boston. The report captures essential discussions on why business continuity now depends on AI resilience and highlights the human as the critical control in managing evolving AI use cases. Beyond tactical advice on board engagement, the overview provides te

-
Dec 18, 20251 min read


AI-Driven Attacks and Defenses
We are pleased to release the summary of "AI-Driven Attacks + Defenses: What Security Leaders Need to Know," a vital briefing from our 15th Annual Conference on November 6th. Featuring insights from Mike Sikorski of Palo Alto Networks Unit 42 and Aurora Blum of Google Cloud Threat Intelligence Group, the session assessed how AI is rapidly changing the cyber threat landscape. The experts emphasized that while attackers are using AI for speed and scale, effective defenses must

-
Dec 11, 20251 min read


The Future of AI Risk and Security
We are thrilled to share the key takeaways from the opening session of our 15th Annual Conference on November 6th, "The Future for AI Risk and Security (2025–2030)!" This critical presentation was delivered by our AI Co-Chairs, Dr. Mark Maybury of Lockheed Martin and Dr. Marc Zissman of MIT Lincoln Laboratory. The summary highlights the importance of applying the traditional CIA Triad to AI security threats and utilizing the NIST Cybersecurity Framework functions. Download th

-
Dec 11, 20251 min read


AI Vendor Assessment Toolkit
The ACSC continues to develop and refine the attached toolkit with member input. This document is meant to help you think about how your traditional 3rd party assessment processes may need to be updated to address novel or complex AI risks.

-
Dec 3, 20251 min read


AI Security Autonomy Framework
Working with AI Security and Risk experts from MIT Lincoln Laboratory , the ACSC developed this AI Security Automation Framework with feedback from its membership and other industry thought-leaders. This document is meant to help members work through the maturity of AI security and how much is being entrusted to automation.

-
Dec 3, 20251 min read


Applying the NIST Cyber Security Framework (CSF) to AI
ACSC's AI Co-Chairs Mark Maybury, Lockheed Martin and Marc Zissman, MIT Lincoln Laboratory presented an overview of how one might apply the five functions of the NIST Cyber Security Framework to AI capabilities at the Annual Member Conference. Their presentation framed the future of AI security and risks.

-
Dec 3, 20251 min read


Terms of Art(ificial Intelligence)
ACSC's AI Co-Chairs Mark Maybury, Lockheed Martin and Marc Zissman, MIT Lincoln Laboratory presented the following AI definitions at the Annual Member Conference to align all participants with a common lexicon for the day's discussions. Their presentation which framed the future of AI security and risks.

-
Dec 3, 20251 min read


GenAI Threats to Confidentiality, Integrity and Availability
ACSC's AI Co-Chairs Mark Maybury, Lockheed Martin and Marc Zissman, MIT Lincoln Laboratory presented the following description of the threats to Generative AI aligned to the CIA - Confidentiality, Integrity and Availability - framework during their presentation which framed the future of AI security and risks.

-
Dec 3, 20251 min read


Develop Your Quantum Strategy
Quantum computing is no longer a distant horizon topic for security leaders, it’s an active planning priority. As organizations prepare for a world where today’s encryption may no longer be sufficient, the Advanced Cyber Security Center (ACSC) is closing the year with a focused discussion on what it takes to build a practical quantum strategy. On December 9, ACSC members will join a special Zoom session featuring Ray Harishankar , IBM Fellow and leader of IBM Quantum Safe. Ra

-
Nov 20, 20251 min read


The Future for AI Risk and Security (2025–2030)
Presented by Mark Maybury, VP of Commercialization, Lockheed Martin, and Marc Zissman, Associate Head, Cyber Security and Information Sciences Division, MIT Lincoln Laboratory AI is no longer a future technology—it’s embedded in the core of modern enterprise. The next challenge isn’t adoption, but assurance: how do we secure intelligent systems that can think, act, and make decisions at machine speed? At the ACSC 15th Annual Member Conference on November 6, two of the field’s

-
Nov 4, 20252 min read


Winning the Competition for Trusted AI: What Members Will Learn at the ACSC 15th Annual Member Conference
This Thursday, November 6, the Advanced Cyber Security Center (ACSC) will host its 15th Annual Member Conference at the Federal Reserve Bank of Boston, a full day of keynotes, panels, and interactive working sessions designed to help members tackle one of the most urgent challenges of our time: building trusted AI systems. A Focus on Action and Application on AI and Security This year’s conference theme - Winning the Competition for Trusted AI: A Risk and Security Agenda -

-
Nov 4, 20252 min read


Why Every Organization Should Revisit Insider Risk Programs
The most damaging security incidents rarely start with an external threat. They start with an insider — sometimes malicious, often careless — who already has access. The results can be catastrophic. Google’s self-driving car unit lost 9.7 gigabytes of intellectual property when a lead engineer walked out with 14,000 files on a removable device. Boeing spent $17 million remediating a breach caused by an employee who emailed sensitive data to his spouse for help formatting a sp

-
Oct 20, 20253 min read


Why Tabletop Exercises Are Essential for Cyber Resilience in 2025
In a major cyber event, the first hours are not only about containment. They are about convening the right team, deciding what and how to...

-
Oct 9, 20253 min read


Securing AI in a Highly-Regulated Sector: CISOs Report
On November 6, 2025, the Advanced Cyber Security Center (ACSC) will host its 15th Annual Member Conference at the Federal Reserve Bank of...

-
Oct 9, 20252 min read


Why Phishing Training Still Misses the Mark
A new study out of UC San Diego Health has reignited debate about the value of phishing training in enterprise security—and what it says...

-
Oct 1, 20253 min read


Cloud Security Posture Management: Strategies, Talent and AI
Think about CSPM in the same way you approach traditional vulnerability management with the same discipline and practices. Cloud...

-
Sep 30, 20241 min read


7 Indicators of a Mature Cyber Risk Governance Program
1. A cross-functional, C-Suite-led cybersecurity executive council oversees the following elements of risk governance and resilience,...

-
Sep 10, 20241 min read


Board Questions & Effective Board Engagement
3 Strategic Oversight Responsibilities Board members should assure: 1. Cybersecurity risks have been incorporated into strategic business...

-
Sep 10, 20241 min read


Insider Risk Programs: Accelerating Around Human Factors
Key Themes Human factors first: Insider risk programs are shifting from an IT focus to organize around human behavior, reflected in cyber...

-
Sep 10, 20241 min read


Cyber Insurance: Market Changes Provider Relationships, And The Future Of Data Sharing
Cyber Insurance: Market Trends, Provider Relationships, the Future of Data Sharing After a period of stable rates, cyber insurance rates...

-
Sep 10, 20241 min read
bottom of page
