Security Digital Summit
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.
Why Attend
New connections
Build new connections with likeminded senior leaders
Business trends
Stay current with emerging business trends
Key takeaways
Downloadable and actionable takeaways
New partnerships
Accelerate key projects through meaningful new partnerships
Insights
De-risk new projects by gaining a broad range of insights
New technologies
Understand the impact new technology can make
Trusted by
We host global organizations with the conversations that matter. That’s why we’re trusted by these top brands.
Event Agenda
09:00 - 09:15
Opening Remarks
Intro & Diamond Commentary
09:15 - 09:45
Keynote
Collectively we are stronger: removing the stigma from cyber attacks
In a recent Help Net Security article, author Sai Venkataraman championed the importance of building more positive attitudes around security breaches. His perspective is that our name-and-shame culture is the biggest roadblock to increasing security postures across the board. A greater culture of openness – including a willingness to share details of attacks and the vulnerabilities exploited – would not only help remove the stigma and secrecy that currently accompanies cyber incidents, it would also help bring the perpetrators to justice and prevent future attacks.
The question is: how can the cyber community collectively break down this stigma together?
09:46 - 10:26
Panel Discussion
The future of Cybersecurity Amid Digital Transformation
Reliable and resilient digital transformation can only be achieved when it has a foundation of cybersecurity beneath it. CIOs and CTOs often transform business solutions to enable the business using tools such as artificial intelligence (AI) and Internet of Things (IoT). But with these tools comes new or increased cybersecurity and technology risks.
By sidestepping cybersecurity in a rush to digitalize, organizations, employees and their customers are left exposed. Digital transformation without cybersecurity is a recipe for disaster so how can security leaders go about deciding the most effective path forward?
10:25 - 10:35
Insight Break
5 Reasons Identity Needs to be the Focus of Your Cloud Security Strategy
It’s time to stop asking ourselves ‘will they get in?’ and instead, ‘what can they do once they’re in?’
In the cloud, identity is the stepping stone allowing lateral movement through our environment. Machine identities are proliferating and outnumbering human identities by what feels like 10-fold. Insight into identities, their entitlements and what data they can access is necessary to bolster any vulnerability management or posture security.In this Insights Break, we’ll share the 5 major reasons identity must be your focus, walking through:
•The dangers of not controlling identity and entitlement proliferation
•How identity insights fill the gaps CWPP and CSPM solutions can’t cover
•The negative effect ‘shifting TOO far left’ has had & what to do about it
•How to prioritize threats based on potential business impact-The cloud identity crisis can be solved with visibility, prioritization and operationalization.
10:35 - 11:25
Roundtables
Track 1: The Changing Scope of Governance, Risk, & Compliance- 2023 and Beyond
While governance, risk, and compliance were once seen as the organization's police - reacting to violations, misconduct, or other wrongdoing- that is no longer the case. Without a robust GRC framework that includes ESG, resiliency and strong cyber and compliance programs, there is a serious risk to a company’s reputation and its ability to attract and retain the best talent and customers. A well-planned GRC strategy comes with lots of benefits: improved decision-making, more optimal IT investments, elimination of silos, and reduced fragmentation among divisions and departments, to name a few.
The stakes have been raised and there are no more excuses. The uncertainties and challenges faced by organizations will only escalate with ongoing technological advancements, a volatile economic and geopolitical landscape, mounting regulations, evolving environmental and social factors, and more.
Join this roundtable to discuss the following questions:
•The massive experiment with remote work puts sensitive company data at risk. How are you managing this from a GRC perspective?
•To manage regulatory compliance risks and mitigate the threat of data breaches, how can DPOs and legal leaders create successful cross-departmental alliances and efficient workflows?
•As cyber-attacks become more devastating, what are some ideas you must minimize risk within the organization?
•How has Environmental/Social/Governance (ESG) affected your GRC strategy?
•What can companies do to strengthen resilience and become future-ready, while also keeping in mind GRC policies?
•Has your organization done any work in breaking the siloes between risk, audit, compliance, and security teams to reduce redundancies and inconsistencies?
•What ideas do you have to move from the traditional and reactive approach to risk management, to one that is initiative-taking, tech- driven, and resilient?
Track 2: Cybersecurity Culture: your strategic asset
Cybersecurity transformation and success is not so much about the technology, but about the people behind it. In a world where 90% of cyber-attacks utilize social engineering to exploit human weakness and bring about errors in judgment, it makes sense that beefing up the security skills of computer users would decrease cybercriminal success. Secure behavior can be taught yet many organizations still struggle with getting everyone to understand their responsibility for security. The disconnect between expectations of the security team and the actual implementation is where we see things fall through the cracks.
Unshielded home networks, untrained employees, and absence of cybersecurity culture will pose a serious threat to organizations unless they take proper precautions.2023 will be the year that organizations seek to solve this problem and place more departmental emphasis on implementing security best practices.
Join this roundtable to discuss the following questions:
•Who is responsible for driving a cybersecurity culture?
•What are the biggest challenges when it comes to leadership, and redefining strategy & cultural mindset?
•Helping people understand the “why” behind security is a vital building block of creating a security mindset. How can this be successfully carried out across large organizations?
•What are the latest best practices in the human aspects of security?
•What is the general trend regarding democratization, employee trust and customer centricity, and what implications does this have for the risk of cyber?
Track 3: Cyber Resilience in A Multi Cloud Environment
Sponsor:
Cybercrime is more pervasive than ever. If you add up the monetary impact of all cybercrimes in 2020, the total is more than $6 Trillion. According to Gartner, organizations have become far more vulnerable to cyberthreats because digital information and technology are now so heavily integrated into day-to-day work. But the attacks themselves, which target both information and critical infrastructure, are also becoming far more sophisticated.
Security leaders are increasingly having to consider the speed of business, people being able to do business beyond boundaries, and how they can enable the business rather than just protect it. A key and growing foundation for increased agility and collaboration is the cloud and the need to consider how cloud security innovation drives innovation in general.
Join this roundtable to discuss the following questions:
•How is the migration to cloud providing new innovation opportunities for the business that need to be navigated and enabled by security?
•What does the current cloud security innovation ecosystem look like and where do security leaders need to show more leadership?
•How has the constantly evolving cyber security regulatory scope affected your deployment of the cloud? What are some of the cloud compliance challenges you are working through?
•Securing the cloud can be challenging, especially in complex, multi-cloud environments. What are some of the biggest challenges that organizations face when attempting to secure their cloud workloads?
•Has the Great Resignation and lack of qualified staff affected your cloud deployment? How are you working through this?
•Cloud environments differ significantly from on-prem infrastructure, which means that traditional security tools and approaches do not always work effectively in the cloud. How has this affected your security strategy?
•How can organizations work to secure their infrastructure when collaborating with vendors and third-party risk?
11:25 - 11:30
Short Break
11:30 - 12:10
Masterclass Breakouts
Personal Information: Data Masking /Anonymization from Document to IoT
Sponsor:
The introduction of GDPR has highlighted concerns about keeping personal data safe, and how some tech giants have built business models based on our likes and dislikes. Anonymization/Data Masking has become a need not only for those organizations seeking to stay compliant, but also those in charge of ethical monetization.
Manuel will review the impact of the various privacy laws and regulations, use cases, available technology, and the growing concern about our personal data being shared with the advent of increasingly more IoT devices and 5G/mobility.
12:11 - 12:41
Headline Keynote
Use Strategic Security Testing To Transform Security Posture
Most security testing today is purely tactical. We find vulnerabilities and sometimes fix them. We use this process to satisfy compliance requirements and report a point-in-time status to regulators, but we rarely learn anything about our overall security posture and use that information to change our strategy and priorities. Strategic, transformational security testing is the solution.
Strategic security testing uses aggregated data from individual penetration tests to reveal the root cause of persistent weaknesses in security posture due to broken processes and overwhelmed staff. Security and IT management can use that data to invest in training and solutions that are specifically targeted at organizational deficiencies. Moreover, a strategic security testing program will track improvements in overall security posture over time so those improvements can be communicated to senior leadership and the board.
09:00 - 09:15
Opening Remarks
09:15 - 09:45
Keynote
Gaining consensus for your cyber security program
What's the difference between gaining agreement for your strategy and objectives, versus gaining consensus? What does it mean to your end user if security is done for them, but managing security risk is done with them, and how do you get them to pay attention?
Join Patrice Bordron, CISO for Community Health Systems, as he shares more than two decades worth of experience building visions and earning program engagement by storytelling through the point of the audience's view.
09:47 - 10:27
Panel Discussion
The Importance of Partnerships in the Fight Against Cybercrime.
Collaboration between public and private sectors is not new but in the evolving world of cybercrime and data manipulation, law enforcement can—and should—play a critical role in preventing criminal activity. This partnership is more imperative today. And it needs to be supported not only by business executives, but also driven by the C-suite and the board.
Public and private sector organizations each must leverage all available resources, and partnerships need to be a strategic part of commitment. Of course, private organizations continue to ensure the development and advancement of their capabilities by maximizing use of next-generation technologies and techniques. At the same time, it’s vital to adopt a “culture of collaboration” both inside organizations and with third parties.
10:27 - 10:37
Insight Break
Make Better Cybersecurity Decisions with Trusted Data Analytics
Struggling to defend your organization against cyber attacks? Wondering how to prioritize limited resources?
A study by the Marsh McLennan Cyber Risk Analytics Center found that poor performance in many BitSight analytics is strongly correlated with the likelihood of experiencing a cybersecurity incident. Join BitSight’s Jacob Olcott to learn:
•The 14 BitSight analytics that correlated to cybersecurity incidents
•Recommendations to improve your cybersecurity program to avoid an incident
10:40 - 11:30
Roundtables
Track 1: The Changing Scope of Governance, Risk, & Compliance- 2023 and Beyond
While governance, risk, and compliance were once seen as the organization's police - reacting to violations, misconduct, or other wrongdoing- that is no longer the case. Without a robust GRC framework that includes ESG, resiliency and strong cyber and compliance programs, there is a serious risk to a company’s reputation and its ability to attract and retain the best talent and customers. A well-planned GRC strategy comes with lots of benefits: improved decision-making, more optimal IT investments, elimination of silos, and reduced fragmentation among divisions and departments, to name a few.
The stakes have been raised and there are no more excuses. The uncertainties and challenges faced by organizations will only escalate with ongoing technological advancements, a volatile economic and geopolitical landscape, mounting regulations, evolving environmental and social factors, and more.
Join this roundtable to discuss the following questions:
•The massive experiment with remote work puts sensitive company data at risk. How are you managing this from a GRC perspective?
•To manage regulatory compliance risks and mitigate the threat of data breaches, how can DPOs and legal leaders create successful cross-departmental alliances and efficient workflows?
•As cyber-attacks become more devastating, what are some ideas you must minimize risk within the organization?
•How has Environmental/Social/Governance (ESG) affected your GRC strategy?
•What can companies do to strengthen resilience and become future-ready, while also keeping in mind GRC policies?
•Has your organization done any work in breaking the siloes between risk, audit, compliance, and security teams to reduce redundancies and inconsistencies?
•What ideas do you have to move from the traditional and reactive approach to risk management, to one that is initiative-taking, tech- driven, and resilient?
Track 2: Cybersecurity Culture: your strategic asset
Cybersecurity transformation and success is not so much about the technology, but about the people behind it. In a world where 90% of cyber-attacks utilize social engineering to exploit human weakness and bring about errors in judgment, it makes sense that beefing up the security skills of computer users would decrease cybercriminal success. Secure behavior can be taught yet many organizations still struggle with getting everyone to understand their responsibility for security. The disconnect between expectations of the security team and the actual implementation is where we see things fall through the cracks.
Unshielded home networks, untrained employees, and absence of cybersecurity culture will pose a serious threat to organizations unless they take proper precautions.2023 will be the year that organizations seek to solve this problem and place more departmental emphasis on implementing security best practices.
Join this roundtable to discuss the following questions:
•Who is responsible for driving a cybersecurity culture?
•What are the biggest challenges when it comes to leadership, and redefining strategy & cultural mindset?
•Helping people understand the “why” behind security is a vital building block of creating a security mindset. How can this be successfully carried out across large organizations?
•What are the latest best practices in the human aspects of security?
•What is the general trend regarding democratization, employee trust and customer centricity, and what implications does this have for the risk of cyber?
Track 3: Cyber Resilience in A Multi Cloud Environment
Sponsor:
Cybercrime is more pervasive than ever. If you add up the monetary impact of all cybercrimes in 2020, the total is more than $6 Trillion. According to Gartner, organizations have become far more vulnerable to cyberthreats because digital information and technology are now so heavily integrated into day-to-day work. But the attacks themselves, which target both information and critical infrastructure, are also becoming far more sophisticated.
Security leaders are increasingly having to consider the speed of business, people being able to do business beyond boundaries, and how they can enable the business rather than just protect it. A key and growing foundation for increased agility and collaboration is the cloud and the need to consider how cloud security innovation drives innovation in general.
Join this roundtable to discuss the following questions:
•How is the migration to cloud providing new innovation opportunities for the business that need to be navigated and enabled by security?
•What does the current cloud security innovation ecosystem look like and where do security leaders need to show more leadership?
•How has the constantly evolving cyber security regulatory scope affected your deployment of the cloud? What are some of the cloud compliance challenges you are working through?
•Securing the cloud can be challenging, especially in complex, multi-cloud environments. What are some of the biggest challenges that organizations face when attempting to secure their cloud workloads?
•Has the Great Resignation and lack of qualified staff affected your cloud deployment? How are you working through this?
•Cloud environments differ significantly from on-prem infrastructure, which means that traditional security tools and approaches do not always work effectively in the cloud. How has this affected your security strategy?
•How can organizations work to secure their infrastructure when collaborating with vendors and third-party risk?
11:31 - 12:01
Innovation Exchange Keynote
Building a cybersecurity culture: Is your organisation future-proofed?
The most valuable asset of modern companies is information - confidential information of your customers, sensitive business data, research work, pre-launch information etc.
Protecting this data and its sanctity is of utmost importance today. That is why it is imperative to build a healthy culture of cyber security in your organization. Employees must be sensitized about the importance of good cybersecurity practices and their individual roles and responsibilities in keeping themselves and the business safe. In this digital age, the weakest links in cybersecurity systems are those using them. Without a proper security culture, you can’t move a step forward. So what should you do and how should you go about building this good cybersecurity culture for your company? Can a data-driven approach to security culture drive greater insight and more meaningful security culture change programs?
During this keynote we hear from Sajed Naseem, CISO at New Jersey Courts.
12:03 - 12:33
Closing Prime Keynote
Security Spring Cleaning and Keeping up with the Evolving Threat Landscape
As we enter 2023, what is the current state of the threat landscape? What are the latest malicious TTP’s and how can we defend against them?
This year’s IBM Security X-Force Threat Intelligence Index presents an uncomfortable truth: as businesses, institutions and governments continue to adapt to a fast-changing global market—including hybrid and cloud-based work environments—threat actors remain adept at exploiting such shifts.
Join IBM Security to hear the latest insights from the newly released X-Force Threat Intelligence Index, including findings from thousands of real-life incident response engagements, top attack types and pathways to compromise observed, and recommendations to strengthen your security posture.
09:00 - 09:15
Opening Remarks
09:15 - 09:45
Keynote
Be Prepared: Securing digital ecosystems amid global disruption
Rapidly emerging technologies, such as AI and machine learning, are poised to radically transform industries across the board, but this double-edged sword also brings with it unique security risks. Couple this with recent geopolitical events and lingering economic uncertainty, and the security industry is in a critical position to stay alert and combat increasing threats.
Advanced capabilities are not only being used by technology experts to provide a safe, secure and enjoyable consumer experience. Criminals are also using these cutting-edge technologies to scale their operations, automate their attacks to reduce the cost of their adversary activity, and develop new control bypass capabilities. By sidestepping cybersecurity in a rush to digitalize, organizations, employees and their customers are left exposed.
Meanwhile, geopolitical situations particularly the Russian invasion of Ukraine have acted as a game changer for the global cyber domain. While we still observe an increase of the number of threats, we also see a wider range of vectors emerge such as zero-day exploits and AI-enabled disinformation and deepfakes. As a result, more malicious and widespread attacks emerge having more damaging impact. How can the security industry prepare for these challenges?
09:46 - 10:26
Panel Discussion
Leadership Innovation: Recruit, Retain and Develop Diverse IT Security Talent
Organizations are rapidly realizing the benefits of a diverse workforce. Despite their best efforts to attract a range of talent, many CISOs and other IT security leaders are concerned that they are failing to meet even their basic staffing goals. Why? In this panel session, we will explore best practices that will attract and retain the right candidates.
10:27 - 10:37
Insight Break
Lightning Strikes: Attack Paths that cross between your clouds
10:37 - 11:27
Roundtable Leaders Panel
11:27 - 11:32
Short Break
11:35 - 12:05
Innovation Exchange Keynote
Election Cybersecurity: What can we learn?
12:06 - 12:36
Closing Keynote
Making Talent Management the Secret Weapon for 2023 and Beyond
In the US, 50% fewer candidates are available today as compared to two years ago in the cyber field. Globally, an estimated 3.5 million cybersecurity jobs went unfulfilled in 2021.
Cybersecurity and the areas within are still relatively new academically alongside the threats and strategies for managing them are ever-changing. As such, even the most experienced cyber talent still requires up to date training and cross-upskilling. Preparing entry level through to seasonal cyber talent requires organizations to understand skill gaps and how to move employees through cybersecurity upskilling quickly.
During this keynote we hear from Renata Spinks at US Marine Corps. Renata, is the Assistant IT Director/Deputy CIO of Information, Command, Control, Communications, and Computers (IC4) at Headquarters Marine Corps with a dual role as the Senior Information Security Officer for the Marine Corps.
12:36 - 12:46
Insight Break -Closing Comments
An immersive
event experience
interactive features including:
Audience Interaction
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
Interactive Live Polling
Keep engaged through interactive live polling and gamification tools.
Direct connections
Ask your questions face-to-face with the speakers via our leading stage technology.
Relationship building
Build stronger connections with leading executives that you will take with you through your career
Thought Leadership
Content and insight from industry experts when it matters most
Intelligent interaction
Interactive quizzes gamify your experience
Have a question…
There is no cost associated with attending a GDS Summit. In return, we ask that all senior executives in participation attend for the full duration to ensure that all attendees get maximum value and insight from the interactive roundtables, live Q&As and breakout networking sessions.
Our digital summit portfolio is designed to bring together senior decision makers from large global businesses and innovative disruptor brands to drive industry forward through addressing business critical challenges collaboratively.
If you’re keen to build new connections with likeminded leaders, de-risk your projects through new insight and establish new partnerships that can accelerate your projects then apply to attend today.
Complete our form below if you’re interested in attending the summit and you meet our application criteria. A member of the GDS team will then reach out to run you through the programme and event format and discuss your participation.
On stage: co-host a panel discussion with a group of likeminded senior executives or host a solo keynote presentation. Both slots include elements of interactive audience Q&A
Off stage: become a roundtable moderator, leading the discussion with the same cohort of executives for the duration of the summit around a specific topic you’ve agreed to focus on during the roundtable session.
We can tailor a partnership package to help meet your business objectives. This might include brand awareness, driving traffic to your site or quality editorial content via exclusive interviews and Q&As with our executive audience. Enquire today for more information.