Security Digital Summit
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.
Why Attend
New connections
Build new connections with likeminded senior leaders
Business trends
Stay current with emerging business trends
Key takeaways
Downloadable and actionable takeaways
New partnerships
Accelerate key projects through meaningful new partnerships
Insights
De-risk new projects by gaining a broad range of insights
New technologies
Understand the impact new technology can make
Trusted by
We host global organizations with the conversations that matter. That’s why we’re trusted by these top brands.
Past Programme
09:00 - 09:15
Opening Remarks
Intro & Diamond Commentary
09:15 - 09:45
Keynote
The Cyber Security Transition is Complete: What this means for the profession, practice and professional.
Transition and change are two different states. For cyber security understanding how to identify and respond accordingly is important for the profession, the practice and the professional. So what is the impact of this increasingly important factor in a world where we continue to secure ‘a moving target’?
09:45 - 10:25
Panel Discussion
Leadership Innovation for an Effective Cybersecurity Culture
Delivering innovative cybersecurity leadership is critical for the global economy. In 2021 alone, there was a dramatic increase in ransomware activity, and according to Harvard Business Review, the worldwide cost of ransomware is predicted to exceed $265 billion by 2031. Because of this, cybersecurity professionals have increased pressure to keep their organizations safe. We must recognize that people are both the best response to cyber-attacks, and the weakest link in cyber security chains. In many organizations, there is a worrying absence of an innovative leadership mindset in how organisations approach their own cybersecurity. It’s critical to foster an environment where employees have the knowledge and instinct to be the first line of defense.
This panel will explore some of the following topics:
•How the last 2+ years of technology disruption has changed your roles as cybersecurity leaders
•Broadening the diversity of available security skill sets to cover the full scope of vulnerabilities for on-premises, cloud, networking, hosts, mobile, applications, etc.
•How effective and innovative solutions can bridge the talent gap and address both near term and longer-term needs.
•What your most pressing challenges are when redefining your cyber strategy and internal cultural mindset
10:25 - 10:35
Insight Break
Start Left in Software Security with Secure Design
Designing a secure application from the start is far more cost effective than playing whack-a-mole with security vulnerabilities in production. We will explore simple techniques to get developers thinking about security at the design stage, before they start writing code.
10:35 - 11:25
Roundtables
Track 1: The Changing Scope of Governance, Risk, & Compliance- 2022 and Beyond
While governance, risk, and compliance were once seen as the organisation’s police- reacting to violations, misconduct, or other wrongdoing- that is no longer the case. Without a robust GRC framework that includes ESG, resiliency and strong cyber and compliance programmes, there is a serious risk to a company’s reputation and its ability to attract and retain the best talent and customers. A well-planned GRC strategy comes with lots of benefits: improved decision-making, more optimal IT investments, elimination of silos, and reduced fragmentation among divisions and departments, to name a few.
The stakes have been raised and there are no more excuses. The uncertainties and challenges faced by organizations will only escalate with ongoing technological advancements, a volatile economic and geopolitical landscape, mounting regulations, evolving environmental and social factors, and more.
Join this roundtable to discuss the following questions:
•The massive experiment with remote work puts sensitive company data at risk. How are you managing this from a GRC perspective?
•To manage regulatory compliance risks and mitigate the threat of data breaches, how can DPOs and legal leaders create successful cross-departmental alliances and efficient workflows?
•As cyber-attacks become more devastating, what are some ideas you must minimize risk within the organization?
•How has Environmental/Social/Governance (ESG) affected your GRC strategy?
•What can companies do to strengthen resilience and become future-ready, while also keeping in mind GRC policies?
•Has your organization done any work in breaking the siloes between risk, audit, compliance, and security teams to reduce redundancies and inconsistencies?
•What ideas do you have to move from the traditional and reactive approach to risk management, to one that is initiative-taking, tech- driven, and resilient?
Track 2: Fixing the Software Supply Chain - Who Owns The Responsibility?
Vulnerabilities in third party software are identified as one of most frequently exploited and costly attack vectors targeting organisations and their supply chains. This issue is perpetuated by a systematic reliance on third party and open source code. In fact, the Linux Foundation estimates that Free and Open Source Software (FOSS) constitutes 70-90% of modern software solutions.
ReversingLabs recently conducted a survey demonstrating that despite 98% of respondents recognizing third party and open source software as contributors to the increasing security risk, only 37% have a way to detect tampering across their software supply chain. Further, 54% of software suppliers acknowledged that their employer was at least open to the possibility that it would distribute software with a known security issue in order to meet delivery schedules.
There is a clear discrepancy between recognition of the risk and impact imposed by a software supply chain attack, and an effort to protect against it. This begs the question, whose responsibility is it to fix?
During this session, we will:
•Define key stakeholders in the supply chain
•Discuss roles and functions within an enterprise responsible for protecting against supply chain attacks
•Explore actionable steps to manage software supply chain security risk exposure
•Analyze how the supply chain threat landscape has changed and why software suppliers are increasingly targeted
•Identify drivers for change (e.g. legal, regulatory, and mandatory requirements)
Track 3: Effective Cloud Security for a Resilient Enterprise
Cloud adoption has grown rapidly in recent years. With remote work becoming the norm, companies need to be able to support and provide critical services to their off-site staff. Cloud-based infrastructure can bring significant benefits to an organization. It offers greater flexibility and scalability, and the ability to reduce costs and overhead by outsourcing much of an organization’s infrastructure stack to the cloud provider.
According to Check Point’s 2022 Cloud Security Report, 27% of organizations have experienced a security incident in their public cloud infrastructure within the last 12 months. Of these, a quarter (23%) were caused by security misconfigurations in cloud infrastructure. Other significant contributors to cloud breaches included improper data sharing (15%), compromised accounts (15%), and vulnerability exploitation (14%).
With the move to the cloud comes a need for cloud security. Cloud-based applications must be protected against attacks, and cloud-hosted data must be protected against unauthorized access in accordance with current regulations. Unfortunately, many organizations today are unfamiliar with how to secure cloud infrastructures. Multi-cloud deployments with diverse types of vendor-provided security settings make it even more difficult to adopt a robust security oversight which, in turn, could result in cloud-based resources being exposed to hackers.
As cloud strategies rapidly evolve, cloud security challenges have become a difficult hurdle to overcome. Join this roundtable to discuss what other leaders are doing to ensure their cloud stays secure and their organization stays resilient in a constantly evolving landscape.
Join this roundtable to discuss the following questions:
•How has the constantly evolving cyber security regulatory scope affected your deployment of the cloud? What are some of the cloud compliance challenges you are working through?
•Securing the cloud can be challenging, especially in complex, multi-cloud environments. What are some of the biggest challenges that organizations face when attempting to secure their cloud workloads?
•Has the Great Resignation and lack of qualified staff affected your cloud deployment? How are you working through this?
•Cloud environments differ significantly from on-prem infrastructure, which means that traditional security tools and approaches do not always work effectively in the cloud. How has this affected your security strategy?
•What innovative tools or platforms are you working with in this area?
•How can organizations work to secure their infrastructure when collaborating with vendors and third-party risk?
11:25 - 11:30
Short Break
11:30 - 12:10
Masterclass Breakouts
Track 1: What Does a Good ROI Look Like When Considering a Cybersecurity Toolset Investment for Threat Detection & Response?
One of the biggest cybersecurity challenges is to justify the value of the right toolset that will identify, detect & thwart organized adversaries’ attack campaigns. Over the last couple of decades, organizations have adopted in depth defense strategies to provide layered defense mechanisms with the aim to protect valuable assets & information. During this session, we’ll explore some of the shortcomings of those strategies and how building walls doesn't help in containing breaches. We’ll also explore how a unified SOC toolset drastically empowers analysts to reduce the time required to identify and contain cyber-attacks, directly impacting the ROI of an organization's cybersecurity investment.
Track 2: ANONYMISATION, PSEUDONYMISATION, OBFUSCATION, REDACTION: WHAT ARE MY CHOICES FOR GDPR COMPLIANCE?
NLP has brought about many changes to our industry, opening the door for language services companies to become Language Intelligence companies, solving complex problems where language solutions are central. After successfully leading the EU's MAPA project (Multilingual Anonymisation for Public Administrations), Manuel Herranz will delve into the different ways to anonymize / pseudonymize /obfuscate sensitive content when working with data at scale, what are the roles and expectations and how GDPR compliant organisations can use anonymization for a more transparent relationship with their users and clients.
Manuel is CEO at Pangeanic. He will present different types of data anonymisation, such as data masking, pseudonymisation, redaction, obfuscation, and typical use cases.
In addition, you will hear some of the challenges in applying anonymisation when data is accessed by many users in modern environments, and how to overcome them.
12:10 - 12:40
Headline Keynote
Staying Secure in the Midst of a Talent Crisis
The worldwide cyber talent shortage is real and growing. Just in the US there are 1 million people employed as cyber security professionals, but over 700,000 unfilled job postings and that number is growing at an alarming rate. Globally, the gap is at least 2.7 million. Initiatives are underway to address the shortage spanning government, industry groups, and the private sector, however the short-term cybersecurity implications are alarming. The lack of skilled practitioners extends beyond the issue of headcount- deficiencies exist in capability, diversity, morale and more. But effective and innovative solutions can bridge the talent gap and address both near term and longer term needs.
In this session we will discuss:
• Current options to increase the cyber talent capacity required to meet organizations’ current and future security needs.
• Broadening the diversity of available security skill sets to cover the full scope of vulnerabilities for on-premise, cloud, networking, hosts, mobile, applications, etc.
• The challenges, and importance, of establishing a continuous testing practice to keep pace with the continuous application development and deployment methodologies.
• The advantages of leveraging a global researcher community as part of your security operations.
• The importance of standard testing frameworks and operational transparency in leveraging untapped and available security talent
12:40 - 12:50
Insight Break
Decentralising Software Security With Security Champions
Hiring enough application security experts to ensure that all software is built and deployed securely is an increasingly impossible task. The solution is to move the responsibility for security into the development teams themselves through security champions.
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
The human factor in Cybersecurity
09:40 - 10:20
Panel Discussion
The Changing Landscape of Third - Party Risk Management
Third-party risk was identified as a top threat by compliance leaders. Every day, businesses experience cybersecurity incidents that can become disruptive, costly, and significantly damage their reputation. Large companies at the center of vast data ecosystems, however, face a particularly difficult problem managing cyber and privacy risks around information that travels to third parties and beyond.
This panel explores the shifting challenges from security leaders who work as clients and third-party providers.
•The importance of developing a robust framework that includes a responsive and resilient risk management operations capability.
•How third-party risk management programs need to have a well -defined and thought- through strategy, supported by a clearly articulated risk appetite.
•Establishing business-driven methods for ongoing risk management analysis.
•How can we create a streamline upfront due diligence focus on critical risks?
10:20 - 10:30
Insight Break
Vulnerability Management: Using device context to make faster decisions about what matters most
Vulnerability management today is mostly manual. The data collection and correlation is time consuming, and vulnerability teams are never sure they've made the best decision about what to act on. Understanding the devices associated with the CVEs can update a process that hasn't seen much change in decades.
10:35 - 11:25
Roundtables
Track 1: The Changing Scope of Governance, Risk, & Compliance- 2022 and Beyond
While governance, risk, and compliance were once seen as the organisation’s police- reacting to violations, misconduct, or other wrongdoing- that is no longer the case. Without a robust GRC framework that includes ESG, resiliency and strong cyber and compliance programmes, there is a serious risk to a company’s reputation and its ability to attract and retain the best talent and customers. A well-planned GRC strategy comes with lots of benefits: improved decision-making, more optimal IT investments, elimination of silos, and reduced fragmentation among divisions and departments, to name a few.
The stakes have been raised and there are no more excuses. The uncertainties and challenges faced by organizations will only escalate with ongoing technological advancements, a volatile economic and geopolitical landscape, mounting regulations, evolving environmental and social factors, and more.
Join this roundtable to discuss the following questions:
•The massive experiment with remote work puts sensitive company data at risk. How are you managing this from a GRC perspective?
•To manage regulatory compliance risks and mitigate the threat of data breaches, how can DPOs and legal leaders create successful cross-departmental alliances and efficient workflows?
•As cyber-attacks become more devastating, what are some ideas you must minimize risk within the organization?
•How has Environmental/Social/Governance (ESG) affected your GRC strategy?
•What can companies do to strengthen resilience and become future-ready, while also keeping in mind GRC policies?
•Has your organization done any work in breaking the siloes between risk, audit, compliance, and security teams to reduce redundancies and inconsistencies?
•What ideas do you have to move from the traditional and reactive approach to risk management, to one that is initiative-taking, tech- driven, and resilient?
Track 2: Fixing the Software Supply Chain - Who Owns The Responsibility?
Vulnerabilities in third party software are identified as one of most frequently exploited and costly attack vectors targeting organisations and their supply chains. This issue is perpetuated by a systematic reliance on third party and open source code. In fact, the Linux Foundation estimates that Free and Open Source Software (FOSS) constitutes 70-90% of modern software solutions.
ReversingLabs recently conducted a survey demonstrating that despite 98% of respondents recognizing third party and open source software as contributors to the increasing security risk, only 37% have a way to detect tampering across their software supply chain. Further, 54% of software suppliers acknowledged that their employer was at least open to the possibility that it would distribute software with a known security issue in order to meet delivery schedules.
There is a clear discrepancy between recognition of the risk and impact imposed by a software supply chain attack, and an effort to protect against it. This begs the question, whose responsibility is it to fix?
During this session, we will:
•Define key stakeholders in the supply chain
•Discuss roles and functions within an enterprise responsible for protecting against supply chain attacks
•Explore actionable steps to manage software supply chain security risk exposure
•Analyze how the supply chain threat landscape has changed and why software suppliers are increasingly targeted
•Identify drivers for change (e.g. legal, regulatory, and mandatory requirements)
Track 3: Effective Cloud Security for a Resilient Enterprise
Cloud adoption has grown rapidly in recent years. With remote work becoming the norm, companies need to be able to support and provide critical services to their off-site staff. Cloud-based infrastructure can bring significant benefits to an organization. It offers greater flexibility and scalability, and the ability to reduce costs and overhead by outsourcing much of an organization’s infrastructure stack to the cloud provider.
According to Check Point’s 2022 Cloud Security Report, 27% of organizations have experienced a security incident in their public cloud infrastructure within the last 12 months. Of these, a quarter (23%) were caused by security misconfigurations in cloud infrastructure. Other significant contributors to cloud breaches included improper data sharing (15%), compromised accounts (15%), and vulnerability exploitation (14%).
With the move to the cloud comes a need for cloud security. Cloud-based applications must be protected against attacks, and cloud-hosted data must be protected against unauthorized access in accordance with current regulations. Unfortunately, many organizations today are unfamiliar with how to secure cloud infrastructures. Multi-cloud deployments with diverse types of vendor-provided security settings make it even more difficult to adopt a robust security oversight which, in turn, could result in cloud-based resources being exposed to hackers.
As cloud strategies rapidly evolve, cloud security challenges have become a difficult hurdle to overcome. Join this roundtable to discuss what other leaders are doing to ensure their cloud stays secure and their organization stays resilient in a constantly evolving landscape.
Join this roundtable to discuss the following questions:
•How has the constantly evolving cyber security regulatory scope affected your deployment of the cloud? What are some of the cloud compliance challenges you are working through?
•Securing the cloud can be challenging, especially in complex, multi-cloud environments. What are some of the biggest challenges that organizations face when attempting to secure their cloud workloads?
•Has the Great Resignation and lack of qualified staff affected your cloud deployment? How are you working through this?
•Cloud environments differ significantly from on-prem infrastructure, which means that traditional security tools and approaches do not always work effectively in the cloud. How has this affected your security strategy?
•What innovative tools or platforms are you working with in this area?
•How can organizations work to secure their infrastructure when collaborating with vendors and third-party risk?
11:25 - 11:55
Innovation Exchange Keynote
11:58 - 12:30
Closing Prime Keynote
Mitigating Cybersecurity Risk in the Digital Supply Chain
Some of the biggest recent cybersecurity incidents have involved adversaries exploiting vulnerabilities in organisations’ digital supply chains. The reality of securing these often complex supply chains presents unique challenges for organisations. Drawing on experience gleaned from dealing with hundreds of cybersecurity incidents every year, this session will provide attendees with insight and actionable advice for effectively mitigating supply chain risk.
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
09:40 - 10:20
Panel Discussion
Treating Cybersecurity as a Business Investment
We all know cyber-security is big business. As organisations digitally transform and put more of their front- and back-office processes online, they are, in turn, creating an increased attack surface for hackers to target. Attacks are becoming more regular and more disruptive, and this upward trend has created huge spending requirements as enterprise level boards have opened their eyes to the challenges now facing them. Spending on cybersecurity threat intelligence will equip your company with robust defences that will protect both your employees and customers against ransomware and phishing attacks, keeping your confidential data secure. It will also preserve your reputation and maintain your target audience’s trust, invaluable in an increasingly unpredictable time.
This panel will explore some of the following discussion points:
•How the skills gap has affected your cyber strategy
•How to achieve buy- in from the boardroom to the shop floor
•Ensuring employees are cyber- safe
•Investing in the right technologies and platforms
10:20 - 10:30
Insight Break
10:30 - 11:20
Roundtable Leaders Panel
11:30 - 12:00
Innovation Exchange Keynote
How Quantification Helps to Make (or Break) Better-Informed Business Decisions About Cybersecurity Investments
IT and Cybersecurity professionals have the technical subject-matter expertise to understand a problem, evaluate potential solutions, and make a recommendation.
But often, we find that making a business case and getting the budget approvals we need from senior business leaders can be challenging. To address these situations, we also need to learn and practice more effective ways to translate the “what, and how” into the all-important “so what, and why.”
This session will provide examples of how to translate technical capabilities into business value, in the language that the budget-holders will understand and respond to -- the language of risk, as risk is properly defined.
Topics include:
•Three high-level categories of business value
•How business decisions involving uncertainties (risk) are currently made
•How much of what we currently do is ""merely useless"" or ""worse than useless"" with respect to making better-informed business decisions than the status quo -- and two key lessons on how to avoid that
•Four recent examples, drawn from both cybersecurity and IT
12:00 - 12:30
Closing Keynote
Looking Into the Future: How CISOs can find their seat at the table
CISOs have a business- critical role in the new world of work and have an unprecedented seat at the corporate table. With the pandemic changing the world, new risk has been introduced, new access points have emerged, and the new technologies that companies are implementing need to be secured. With reports coming out about cybersecurity negligence, and continued hacks that threaten customer data, the urgency for CISOs to sell cybersecurity as a corporate- level topic has never been more critical. Join Jeff Moore, CISO from Staples, who will discuss what the CISO role of the future should look in 2023 and beyond.
12:30 - 12:40
Insight Break -Closing Comments
An immersive
event experience
interactive features including:
Audience Interaction
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
Interactive Live Polling
Keep engaged through interactive live polling and gamification tools.
Direct connections
Ask your questions face-to-face with the speakers via our leading stage technology.
Relationship building
Build stronger connections with leading executives that you will take with you through your career
Thought Leadership
Content and insight from industry experts when it matters most
Intelligent interaction
Interactive quizzes gamify your experience
Have a question…
There is no cost associated with attending a GDS Summit. In return, we ask that all senior executives in participation attend for the full duration to ensure that all attendees get maximum value and insight from the interactive roundtables, live Q&As and breakout networking sessions.
Our digital summit portfolio is designed to bring together senior decision makers from large global businesses and innovative disruptor brands to drive industry forward through addressing business critical challenges collaboratively.
If you’re keen to build new connections with likeminded leaders, de-risk your projects through new insight and establish new partnerships that can accelerate your projects then apply to attend today.
Complete our form below if you’re interested in attending the summit and you meet our application criteria. A member of the GDS team will then reach out to run you through the programme and event format and discuss your participation.
On stage: co-host a panel discussion with a group of likeminded senior executives or host a solo keynote presentation. Both slots include elements of interactive audience Q&A
Off stage: become a roundtable moderator, leading the discussion with the same cohort of executives for the duration of the summit around a specific topic you’ve agreed to focus on during the roundtable session.
We can tailor a partnership package to help meet your business objectives. This might include brand awareness, driving traffic to your site or quality editorial content via exclusive interviews and Q&As with our executive audience. Enquire today for more information.