Events

Technology & Innovation
What's next for AI & cybersecurity
Mark Casey
Equity Portfolio Manager
Michael Antico
Chief Information Security Officer, Capital Group

As technology and AI shape our daily lives, understanding how to protect your personal information has become essential. We discussed how the threat landscape is evolving and offered practical steps you can take to better safeguard your information with Mark Casey, a Capital Group equity portfolio manager and veteran Silicon Valley investor, and Michael Antico, Capital Group’s chief information security officer. Quarterly Insights editor-in-chief Walter Hamilton moderated.



Mark Casey is an equity portfolio manager with 25 years of investment industry experience (as of 12/31/2025). He holds an MBA from Harvard and a bachelor’s degree from Yale.

Michael Antico is the chief information security officer at Capital Group. Previously, Michael held global and regional chief information security officer leadership positions at some of the world’s largest financial institutions, including CLEAR, Santander, BNP Paribas, Barclays and Lehman Brothers. Michael has a bachelor’s degree in computer science with a minor in math from Seton Hall University.


Explore topics
Technology & Innovation

 

Definitions:

GDP: Gross domestic product. The total value of all finished goods and services produced or provided in a country or region during a specific time period.

 

MFA: See two-factor authentication.

 

Phishing: A method of attempting to get information from a victim by posing as a trusted third party. A phishing attempt might involve sending emails designed to look like they came from the government or a large corporation, for example, with links to fraudulent websites.

 

Two-factor authentication: TFA or MFA (multi-factor authentication). This is a security practice that asks users to approve or confirm a log in attempt through another channel or device, such as an email or text message.

 

Virtual private network: VPN. This is a method of connecting to a server that encrypts your data, authenticates your device and disguises your device and connection. It allows you to use the internet more securely.

 

VPN: See virtual private network.