Security Digital Summit
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.
Why Attend
New connections
Build new connections with likeminded senior leaders
Business trends
Stay current with emerging business trends
Key takeaways
Downloadable and actionable takeaways
New partnerships
Accelerate key projects through meaningful new partnerships
Insights
De-risk new projects by gaining a broad range of insights
New technologies
Understand the impact new technology can make
Trusted by
We host global organizations with the conversations that matter. That’s why we’re trusted by these top brands.
Past Programme
09:00 - 09:15
Opening Remarks
Intro & Diamond Commentary
09:15 - 09:45
Keynote
09:45 - 10:25
Panel Discussion
Leadership Innovation: Recruit, Retain and Develop Diverse IT Security Talent
Organizations are rapidly realizing the benefits of a diverse workforce. Despite their best efforts to attract a range of talent, many CISOs and other IT security leaders are concerned that they are failing to meet even their basic staffing goals. Why? In this panel session, we will explore best practices that will attract and retain the right candidates.
10:25 - 10:35
Insight Break
10:35 - 11:25
Roundtables
Track 1: Cloud Security: Outpace the speed of change!
According to Gartner, spending on public cloud services will grow by 21.7% and hit $482 billion in 2022. This means as organizations mull new hybrid workplaces, reliance on cloud infrastructure will gain momentum.
Spreading operations across more than one cloud enables organizations to choose from a variety of cloud services to cut costs, improve operations and improve scalability. However, operating complex environments across multiple platforms requires a comprehensive strategy to handle connectivity, applications, data and security.
The constant growth of technologies, strategies and new vendors poses an additional challenge for cloud security. During this roundtable we will explore core concepts of cloud security, from people and processes to the technologies at each of the layers needed to ensure your cloud security strategy keeps up with the pace of change.
In this roundtable we will explore:
•What are some of the challenges you are facing with data protection in multi-cloud environments? •How can executives successfully manage different built-in security controls, tools, and regulations?
•In-depth expertise in each cloud environment is essential which grows more difficult as the number of environments grows. How can security leaders ensure the consistent and necessary access to Cloud Skills?
•50% of organizations have difficulty with understanding how security solutions work together. What are your top priorities for achieving successful integration?
•When faced with the difficulty of a shared responsibility model and reliance on vendor-controlled infrastructure, how does your organization achieve visibility and control in multi-cloud environments?
Track 2: Zero to Hero – Empowering your Cybersecurity Strategy with Zero Trust
Many companies are now looking to implement stronger security strategies to align with future company goals, better customer experience, and keep ahead of cyber threats. With cyberattacks on the rise, organizations should never automatically trust anything inside or outside their network. In fact, 90%+ of incidents occur due to a failure in process and/or the human element (Verizon).
Remote working, sharing of data to suppliers, and interlinking networks all add exposure to your networks. More exposure increases the opportunity for security breaches. Leading organizations are adopting a Zero Trust approach which continuously verifies users & devices to ensure access and privilege is granted only when it is needed. The framework dictates that only authenticated and authorized users can access applications and data. At the same time, it protects those applications and users from advanced threats on the internet.
A study by IBM in 2021 found that the average cost of a data breach was USD 1.76 million less at organizations with a mature zero trust approach, compared to organizations without zero trust. So, how do you get there? How do you implement a step-by-step strategy for your business to gain security across your whole network?
Join this roundtable to discuss challenges, and opportunities in adopting a zero-trust approach to identity security, and best practices moving forward to stay ahead of future threats, protect your business and enable growth.
In this roundtable we will explore:
•With the rise in cyber threats, how have you structured your security infrastructure and how are you currently monitoring & defending against cyber threats? What key challenges are you facing?
•Where are you on your Zero Trust journey? How are you balancing privacy, protection and security with the availability of resources?
•Are you able to identify all points of access across all users (employees, customers, and third parties) and identify any gaps within those access points? Are you verifying anything and everything trying to connect to your systems before granting access?
•Internal company culture around security has been named previously as a challenge when introducing zero trust. Is this a challenge that resonate with you? How have you set out to work around company culture with zero trust?
•Does your organization have a requirement to support both managed and unmanaged devices, given the shift to remote work?
•What are some of the challenges you are facing with governance and data security, both on-prem and in the cloud? What steps have you taken, or are looking to take, to overcome these?
•Are you planning on implementing Zero Trust type strategy for machine/non-human identities and access?
•What are your top priorities moving forward to adopt a zero-trust approach to identity security?
Track 3: How to Build a Positive Cybersecurity/Data Security Culture
According to a Gartner study, By 2026, at least 50% of C-Level executives will have performance requirements related to cybersecurity risk built into their employment contracts. In a world where 90% of cyber-attacks utilize social engineering to exploit human weakness and bring about errors in judgment, it makes sense that beefing up the security skills of computer users would decrease cybercriminal success. Secure behavior can be taught yet many organizations still struggle with getting everyone to understand their responsibility for security.
This has executives who are tasked with managing cyber risk asking themselves – how can we get people to care more about cybersecurity?
In this roundtable we will explore:
•What are the biggest challenges when it comes to leadership, and redefining strategy & cultural mindset?
•Helping people understand the “why” behind security is a vital building block of creating a security mindset. How can this be successfully carried out across large organizations?
•What are the latest best practices in the human aspects of security?
•What is the general trend with regards to democratization, employee trust and customer centricity and what implications does this have for the risk of cyber?
11:25 - 11:30
Short Break
11:30 - 12:10
Masterclass Breakouts
12:11 - 12:41
Headline Keynote
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
09:40 - 10:20
Panel Discussion
Unity is key: How can your Security and IT teams accelerate how they identify, prevent and respond to threats?
The last couple of years saw the largest and most rapid work transformation in history. The Security and IT workforce is now more distributed and diverse than ever before – and the transformation isn’t stopping. How can you unify your security and IT teams and accelerate how they identify, prevent and respond to threats?
Today, the cyberattack surface is inclusive of living rooms, kitchens, home networks and personal devices. This climate creates an attractive space for hackers who are employing a more diverse range of attacks. According to the VMWare Global Security Insights Report, almost 80% of those surveyed said the vast increase of attacks over the last 18 months was a direct result of more employees working from home.
It is crucial to build a strategy that secures your organization, shifting from a reactive security posture to a position of strength. So how can we seamlessly secure endpoints, workloads, data, clouds and networks so users have flexibility and can remain agile?
It all starts with unifying your security and IT teams. Within this panel discussion we will be exploring this concept as well as how to leverage your infrastructure to best secure your organization.
10:20 - 10:30
Insight Break
10:35 - 11:25
Roundtables
Track 1: Cloud Security: Outpace the speed of change!
According to Gartner, spending on public cloud services will grow by 21.7% and hit $482 billion in 2022. This means as organizations mull new hybrid workplaces, reliance on cloud infrastructure will gain momentum.
Spreading operations across more than one cloud enables organizations to choose from a variety of cloud services to cut costs, improve operations and improve scalability. However, operating complex environments across multiple platforms requires a comprehensive strategy to handle connectivity, applications, data and security.
The constant growth of technologies, strategies and new vendors poses an additional challenge for cloud security. During this roundtable we will explore core concepts of cloud security, from people and processes to the technologies at each of the layers needed to ensure your cloud security strategy keeps up with the pace of change.
In this roundtable we will explore:
•What are some of the challenges you are facing with data protection in multi-cloud environments? •How can executives successfully manage different built-in security controls, tools, and regulations?
•In-depth expertise in each cloud environment is essential which grows more difficult as the number of environments grows. How can security leaders ensure the consistent and necessary access to Cloud Skills?
•50% of organizations have difficulty with understanding how security solutions work together. What are your top priorities for achieving successful integration?
•When faced with the difficulty of a shared responsibility model and reliance on vendor-controlled infrastructure, how does your organization achieve visibility and control in multi-cloud environments?
Track 2: Zero to Hero – Empowering your Cybersecurity Strategy with Zero Trust
Many companies are now looking to implement stronger security strategies to align with future company goals, better customer experience, and keep ahead of cyber threats. With cyberattacks on the rise, organizations should never automatically trust anything inside or outside their network. In fact, 90%+ of incidents occur due to a failure in process and/or the human element (Verizon).
Remote working, sharing of data to suppliers, and interlinking networks all add exposure to your networks. More exposure increases the opportunity for security breaches. Leading organizations are adopting a Zero Trust approach which continuously verifies users & devices to ensure access and privilege is granted only when it is needed. The framework dictates that only authenticated and authorized users can access applications and data. At the same time, it protects those applications and users from advanced threats on the internet.
A study by IBM in 2021 found that the average cost of a data breach was USD 1.76 million less at organizations with a mature zero trust approach, compared to organizations without zero trust. So, how do you get there? How do you implement a step-by-step strategy for your business to gain security across your whole network?
Join this roundtable to discuss challenges, and opportunities in adopting a zero-trust approach to identity security, and best practices moving forward to stay ahead of future threats, protect your business and enable growth.
In this roundtable we will explore:
•With the rise in cyber threats, how have you structured your security infrastructure and how are you currently monitoring & defending against cyber threats? What key challenges are you facing?
•Where are you on your Zero Trust journey? How are you balancing privacy, protection and security with the availability of resources?
•Are you able to identify all points of access across all users (employees, customers, and third parties) and identify any gaps within those access points? Are you verifying anything and everything trying to connect to your systems before granting access?
•Internal company culture around security has been named previously as a challenge when introducing zero trust. Is this a challenge that resonate with you? How have you set out to work around company culture with zero trust?
•Does your organization have a requirement to support both managed and unmanaged devices, given the shift to remote work?
•What are some of the challenges you are facing with governance and data security, both on-prem and in the cloud? What steps have you taken, or are looking to take, to overcome these?
•Are you planning on implementing Zero Trust type strategy for machine/non-human identities and access?
•What are your top priorities moving forward to adopt a zero-trust approach to identity security?
Track 3: How to Build a Positive Cybersecurity/Data Security Culture
According to a Gartner study, By 2026, at least 50% of C-Level executives will have performance requirements related to cybersecurity risk built into their employment contracts. In a world where 90% of cyber-attacks utilize social engineering to exploit human weakness and bring about errors in judgment, it makes sense that beefing up the security skills of computer users would decrease cybercriminal success. Secure behavior can be taught yet many organizations still struggle with getting everyone to understand their responsibility for security.
This has executives who are tasked with managing cyber risk asking themselves – how can we get people to care more about cybersecurity?
In this roundtable we will explore:
•What are the biggest challenges when it comes to leadership, and redefining strategy & cultural mindset?
•Helping people understand the “why” behind security is a vital building block of creating a security mindset. How can this be successfully carried out across large organizations?
•What are the latest best practices in the human aspects of security?
•What is the general trend with regards to democratization, employee trust and customer centricity and what implications does this have for the risk of cyber?
11:25 - 11:55
Innovation Exchange Keynote
In the Fight With You
11:58 - 12:30
Closing Prime Keynote
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
Can You Trust the Cloud with Your Sensitive Data?
09:41 - 10:21
Panel Discussion
Is your Third Party Security Risk Program on the path to success?
Organizations are responding to record numbers of third-party data breaches, and supply chain disruptions due to continued pandemic shutdowns, and even the war in Ukraine. The key to minimizing the risk of third-party breaches is to implement a comprehensive and efficient third-party security risk management (TPSRM) process. This panel will discuss the increasing challenges surrounding third-party security as well as ways to efficiently and effectively manage the TPSRM process.
10:22 - 11:02
Keynote
11:02 - 11:57
Roundtable Leaders Panel
12:00 - 12:30
Closing Keynote
12:30 - 12:40
Insight Break -Closing Comments
An immersive
event experience
interactive features including:
Audience Interaction
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
Interactive Live Polling
Keep engaged through interactive live polling and gamification tools.
Direct connections
Ask your questions face-to-face with the speakers via our leading stage technology.
Relationship building
Build stronger connections with leading executives that you will take with you through your career
Thought Leadership
Content and insight from industry experts when it matters most
Intelligent interaction
Interactive quizzes gamify your experience
Have a question…
There is no cost associated with attending a GDS Summit. In return, we ask that all senior executives in participation attend for the full duration to ensure that all attendees get maximum value and insight from the interactive roundtables, live Q&As and breakout networking sessions.
Our digital summit portfolio is designed to bring together senior decision makers from large global businesses and innovative disruptor brands to drive industry forward through addressing business critical challenges collaboratively.
If you’re keen to build new connections with likeminded leaders, de-risk your projects through new insight and establish new partnerships that can accelerate your projects then apply to attend today.
Complete our form below if you’re interested in attending the summit and you meet our application criteria. A member of the GDS team will then reach out to run you through the programme and event format and discuss your participation.
On stage: co-host a panel discussion with a group of likeminded senior executives or host a solo keynote presentation. Both slots include elements of interactive audience Q&A
Off stage: become a roundtable moderator, leading the discussion with the same cohort of executives for the duration of the summit around a specific topic you’ve agreed to focus on during the roundtable session.
We can tailor a partnership package to help meet your business objectives. This might include brand awareness, driving traffic to your site or quality editorial content via exclusive interviews and Q&As with our executive audience. Enquire today for more information.