Security Digital Summit
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.
Ben Thompson
Why Attend
New connections
Build new connections with likeminded senior leaders
Business trends
Stay current with emerging business trends
Key takeaways
Downloadable and actionable takeaways
New partnerships
Accelerate key projects through meaningful new partnerships
Insights
De-risk new projects by gaining a broad range of insights
New technologies
Understand the impact new technology can make
Trusted by
We host global organizations with the conversations that matter. That’s why we’re trusted by these top brands.
Past Programme
09:00 - 09:15
Opening Remarks
Intro & Diamond Commentary
09:15 - 09:45
Keynote
09:45 - 10:25
Panel Discussion
Structure leads to freedom! – Do current frameworks support the innovation required?
Given the growing threat landscape security teams rely on innovation and the adoption of new technologies to protect their businesses even more. The reality is that innovation is not happening quick enough. Many companies are not scaling technologies effectively or investing enough in the companies that support them. Where is the bottle neck? Many security leaders lay the blame at the lack of talent to execute, engagement in the wider business, buy in from leadership or complexity related to the stack and the ecosystem that supports it. Perhaps the issue lies even deeper within the very frameworks that govern the company’s approach to innovation. Many of these frameworks are 30 years old and can suffer from prevention bias while dictating control and methdologies that are no longer fit for purpose.
10:25 - 10:35
Insight Break
10:35 - 11:25
Roundtables
Track 1: Building organizational resilience amid a talent crisis
The talent shortages within security organizations are well known, especially when considering the critical skills required from cyber professionals. For many leaders the question of how to stay secure amid a talent crises seems to be the most important consideration. Yet even for organizations that have what they would consider a quality bench of cyber talent, the threat is only increasing and as such resilience needs to be considered together with perceived security levels.
This roundtable track explores the following key questions:
•How much progress are companies making in developing cyber talent outside of traditional channels?
•How do you develop policies and processes that strike a balance between protecting critical assets, detecting compromises and responding to incidents?
•What does it mean to create a cyber- resilient culture that sees the whole organisation as security champions?
Track 2: Driving business value with cloud security innovation
Security leaders are increasingly having to consider speed of business, people being able to do business beyond boundaries, and how can they enable the business rather than just protect it. A key and growing foundation for increased agility and collaboration is the cloud and security leaders need to consider how cloud security innovation drives innovation in general.
This roundtable explores the following key questions:
•How is the migration to cloud providing new innovation opportunities for the business that need to be navigated and enabled by security?
•What does the current cloud security innovation ecosystem look like and where do security leaders need to show more leadership?
Track 3: Achieving a more secure software development life cycle & data management program
The days of releasing a product into the wild and addressing bugs in subsequent patches are gone. Today organisations gave to build security into all stages of the software development cycle and due to increasing scale, automation and cost this will only become more important. Yet knowing whether these processes should be top down or bottom up together with the resulting impact on implementation costs, remediation time and vulnerabilities of each approach is of key concern. To ensure that companies are putting out innovative products that will protect the consumer and the business, security leaders need to appreciate which SSDLC approaches and technologies will work best.
This roundtable track considers the following questions:
•How are the current market conditions and the pressure on companies to innovate digital experiences more quickly, putting pressure on SSDLC’s?
•How will SSDLC’s change in what is becoming the democratised age where different functions have greater control over their digital destinies?
11:25 - 11:30
Short Break
11:30 - 12:10
Masterclass Breakouts
Developing robust predictive risk modeling capabilities and reviewing opportunities within TPRM
Understanding our third parties and the risks they pose is becoming an existential part of managing corporate risk. As the average number of third parties used by companies increases, the burden to gather this information has become overwhelming. The risk has never been higher, with over 63% of all breaches linked directly to a third party vendor. The traditional way of gathering assessments is too slow; relying on outside in scanning is insufficient. Using the worlds largest exchange of cybersecurity risk assessments, the power of risk monitoring and cutting edge machine learning technology, CyberGRX has created Predictive Assessments. On day 1, view detailed risk data for your third parties and shift the conversation from data gathering, to risk management. Prevent a breach by actually managing risk.
12:11 - 12:41
Headline Keynote
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
Build your talent pipeline to secure tomorrow’s success
Explore creative ways of developing your talent pool including taking an active role in partnering with local universities to train tomorrow’s security teams.
09:40 - 10:20
Panel Discussion
Unity is key: How can your Security and IT teams accelerate how they identify, prevent and respond to threats?
The last couple of years saw the largest and most rapid work transformation in history. The Security and IT workforce is now more distributed and diverse than ever before – and the transformation isn’t stopping. How can you unify your security and IT teams and accelerate how they identify, prevent and respond to threats?
Today, the cyberattack surface is inclusive of living rooms, kitchens, home networks and personal devices. This climate creates an attractive space for hackers who are employing a more diverse range of attacks. According to the VMWare Global Security Insights Report, almost 80% of those surveyed said the vast increase of attacks over the last 18 months was a direct result of more employees working from home.
It is crucial to build a strategy that secures your organization, shifting from a reactive security posture to a position of strength. So how can we seamlessly secure endpoints, workloads, data, clouds and networks so users have flexibility and can remain agile?
It all starts with unifying your security and IT teams. Within this panel discussion we will be exploring this concept as well as how to leverage your infrastructure to best secure your organization.
•How has the vast increase in remote working impacted your organization when it comes to security? Have you seen an uptick in threats? What key challenges are you facing?
•What steps are you taking to protect your business from attacks? How are you identifying, preventing, and responding to threats with the right context and insights?
•What are your best practices when it comes to breaking down the siloes between security and IT for effective long term digital transformation strategies? How can we unify these teams and alleviate tensions? Should the CISO report to the CEO/ board vs. the CIO?
•How has the evolving threat landscape, sophistications and volumes impacted your security & IT teams when it comes to protecting workforces and workspaces? What action are you taking to remain one step ahead?
•What should be the top priority for the organization moving forward when thinking about a "work from anywhere" approach?
•User training is crucial when it comes to best practice cyber security and mitigating risks. How can the CISO create a considered, personalised approach in order to build both an effective first line of threat defence, and a security-aware corporate culture?
10:20 - 10:30
Insight Break
10:35 - 11:25
Roundtables
Track 1: Building organizational resilience amid a talent crisis
The talent shortages within security organizations are well known, especially when considering the critical skills required from cyber professionals. For many leaders the question of how to stay secure amid a talent crises seems to be the most important consideration. Yet even for organizations that have what they would consider a quality bench of cyber talent, the threat is only increasing and as such resilience needs to be considered together with perceived security levels.
This roundtable track explores the following key questions:
•How much progress are companies making in developing cyber talent outside of traditional channels?
•How do you develop policies and processes that strike a balance between protecting critical assets, detecting compromises and responding to incidents?
•What does it mean to create a cyber- resilient culture that sees the whole organisation as security champions?
Track 2: Driving business value with cloud security innovation
Security leaders are increasingly having to consider speed of business, people being able to do business beyond boundaries, and how can they enable the business rather than just protect it. A key and growing foundation for increased agility and collaboration is the cloud and security leaders need to consider how cloud security innovation drives innovation in general.
This roundtable explores the following key questions:
•How is the migration to cloud providing new innovation opportunities for the business that need to be navigated and enabled by security?
•What does the current cloud security innovation ecosystem look like and where do security leaders need to show more leadership?
Track 3: Achieving a more secure software development life cycle & data management program
The days of releasing a product into the wild and addressing bugs in subsequent patches are gone. Today organisations gave to build security into all stages of the software development cycle and due to increasing scale, automation and cost this will only become more important. Yet knowing whether these processes should be top down or bottom up together with the resulting impact on implementation costs, remediation time and vulnerabilities of each approach is of key concern. To ensure that companies are putting out innovative products that will protect the consumer and the business, security leaders need to appreciate which SSDLC approaches and technologies will work best.
This roundtable track considers the following questions:
•How are the current market conditions and the pressure on companies to innovate digital experiences more quickly, putting pressure on SSDLC’s?
•How will SSDLC’s change in what is becoming the democratised age where different functions have greater control over their digital destinies?
11:25 - 11:55
Innovation Exchange Keynote
Risky Business - Moving beyond security gaps to enabling your business to make smart risk-based decisions
Security organizations have become efficient practitioners of identifying and reporting security gaps. While this meets expectations from a security standpoint, it does not help our business to understand its operational risk, prioritize work, or make strategic decisions. This talk sheds light on how to mature your security team into an organization that can move beyond security gaps to effectively enable your business to make smart risk-based decisions.
11:58 - 12:30
Closing Prime Keynote
Struggling to defend your organization against cyber attacks? Wondering how to prioritize limited resources?
A study by the Marsh McLennan Cyber Risk Analytics Center found that poor performance in many BitSight analytics is statistically significant and correlated with the likelihood of experiencing a cybersecurity incident. Join BitSight’s Derek Vadala to walk through this research and takeaways.
Join us to learn:
•The 14 BitSight analytics that correlated to cybersecurity incidents
•Recommendations to improve programmatic areas in your cybersecurity strategy
•Performance areas to prioritize to achieve better cyber insurance coverage and terms
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
Building Security Cultures Through The Back Door
09:40 - 10:20
Panel Discussion
Protecting a wider net- the Modern CISO’s API strategy
Many organizations cannot keep up with the pace of innovation without relying on a larger ecosystem of partners to provide key capabilities. The API management market size is expected to grow from USD 4.5 billion in 2022 to USD 13.7 billion by 2027 according to research by Markets&Markets. The most critical API security risks include: Broken object level, user- and function-level authorization, excessive data exposure, lack of resource, security misconfiguration, and insufficient logging and monitoring. The implications of these and other risks are huge. This panel explores how the modern CISO prepares for a future where for their companies ability to compete requires the management of a more complex innovation ecosystem.
10:20 - 10:30
Insight Break
10:30 - 11:20
Roundtable Leaders Panel
11:30 - 12:00
Innovation Exchange Keynote
Powering payment promises - Building trust in increasingly distributed systems
12:00 - 12:30
Closing Keynote
Start left in software security with secure design
An immersive
event experience
interactive features including:
Audience Interaction
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
Interactive Live Polling
Keep engaged through interactive live polling and gamification tools.
Direct connections
Ask your questions face-to-face with the speakers via our leading stage technology.
Relationship building
Build stronger connections with leading executives that you will take with you through your career
Thought Leadership
Content and insight from industry experts when it matters most
Intelligent interaction
Interactive quizzes gamify your experience
Have a question…
There is no cost associated with attending a GDS Summit. In return, we ask that all senior executives in participation attend for the full duration to ensure that all attendees get maximum value and insight from the interactive roundtables, live Q&As and breakout networking sessions.
Our digital summit portfolio is designed to bring together senior decision makers from large global businesses and innovative disruptor brands to drive industry forward through addressing business critical challenges collaboratively.
If you’re keen to build new connections with likeminded leaders, de-risk your projects through new insight and establish new partnerships that can accelerate your projects then apply to attend today.
Complete our form below if you’re interested in attending the summit and you meet our application criteria. A member of the GDS team will then reach out to run you through the programme and event format and discuss your participation.
On stage: co-host a panel discussion with a group of likeminded senior executives or host a solo keynote presentation. Both slots include elements of interactive audience Q&A
Off stage: become a roundtable moderator, leading the discussion with the same cohort of executives for the duration of the summit around a specific topic you’ve agreed to focus on during the roundtable session.
We can tailor a partnership package to help meet your business objectives. This might include brand awareness, driving traffic to your site or quality editorial content via exclusive interviews and Q&As with our executive audience. Enquire today for more information.