Cyber resilience strategies for a complex world
Navigate the wave of change as generative AI booms, SEC introduces new rules, and advanced threats surge. CISOs lead through uncertainty, enhancing efficiency, productivity, and growth.
Yet, technology alone won't suffice – it can expose your enterprise. Empower secure investments, elevate decisions, and fortify your business with our expert guidance.
Immerse yourself in thought-provoking insights
Exclusively curated from our previous
Security Physical Summit
Agenda
1:10 pm - 1:30 pm
Keynote
1:35 pm - 2:15 pm
Panel
The importance of partnerships in the fight against cybercrime
Collaboration between public and private sectors is not new but in the evolving world of cybercrime and data manipulation, law enforcement can—and should—play a critical role in preventing criminal activity. This partnership is more imperative today. And it needs to be supported not only by business executives, but also driven by the C-suite and the board.
Public and private sector organizations each must leverage all available resources, and partnerships need to be a strategic part of commitment. Of course, private organizations continue to ensure the development and advancement of their capabilities by maximizing use of next-generation technologies and techniques. At the same time, it’s vital to adopt a “culture of collaboration” both inside organizations and with third parties.
2:15 pm - 2:40 pm
Keynote
3:00 pm - 4:00 pm
Roundtables
Track 1: Ransomware: Are you asking the right questions?
Ransomware has been one of the most insidious threats to organizations of all sizes and across all industries for years, showing no sign of slowing down. Cohesity's new research, which includes the views of over 900 IT and security decision-makers globally, underscores this growing menace. Nearly 80% of respondents reported their organization had fallen victim to a ransomware attack in the second half of 2023.
This roundtable will explore three pivotal discussion points:
- Evolution of ransomware tactics: How have ransomware techniques evolved, particularly in terms of encryption methods and evasion tactics? What innovative strategies are attackers using, and how can organizations anticipate and counteract these threats?
- Proactive Defense Measures: What proactive measures can organizations implement to stay one step ahead of ransomware attacks? This discussion will cover best practices in prevention, detection, and response to minimize risk and impact.
- Cost of Inaction: What are the potential consequences of failing to address the ransomware threat adequately? We'll explore the financial, operational, and reputational costs of inaction and emphasize the importance of a robust cybersecurity strategy.
Join us to gain valuable insights and strategies for defending against the relentless threat of ransomware.
Track 2: Safeguarding sata in the AI era
In the age of AI, data privacy and security have become more critical than ever. The vast amounts of data collected and processed by AI systems amplify the risk of data breaches, which can lead to significant trust issues and legal ramifications due to unauthorized access to sensitive information.
AI introduces additional complexities, including the risks of bias, discrimination, and hallucination. As privacy regulations become increasingly stringent, organizations must ensure their data governance practices not only comply with these regulations but also adapt to the rapid advancements in AI technology.
This roundtable will delve into three pivotal discussion points:
- Emerging Security and Privacy Threats: What new threats to data security and privacy are emerging in the age of AI, and how can we proactively address them to protect sensitive information?
- Balancing Innovation and Regulation: How can organizations strike a balance between fostering AI innovation and adhering to stringent privacy regulations? What best practices can help ensure security without stifling technological advancements?
- Ethical AI and Bias Mitigation: What strategies can be implemented to mitigate the risks of bias and discrimination in AI systems, ensuring ethical data use and enhancing trust among stakeholders?
Join this round table to explore these crucial issues and develop actionable insights to enhance data security in the dynamic landscape of AI.
Track 3: Risk busters: Navigating cyber threats with governance
Recent research from IBM indicates that data breaches now cost businesses an average of US$4.45 million annually, marking a 15% increase over the past three years. As organizations face challenges such as fragmented systems, rising third and fourth-party risks, and the rapid pace of technological change, it becomes imperative to adopt a comprehensive approach to governance, risk, and compliance in 2024.
This roundtable will explore three crucial discussion points:
- Strengthening Security Posture: How can organizations enhance their security measures to guard against the ever-evolving landscape of cyber threats and data breaches? What strategies are most effective in fortifying security?
- Achieving Greater Visibility: What methods can be employed to gain better visibility across both internal operations and the broader ecosystem? How can organizations ensure they have a clear and comprehensive view of potential risks?
- Leveraging Emerging Tools: How can emerging tools and methodologies be utilized to maximize efficiency and effectiveness in governance, risk, and compliance? What innovations should organizations consider to do more with less?
Join this round table to uncover actionable insights and strategies to bolster your organization’s security posture and navigate the complexities of today's risk landscape.
4:10 pm - 4:40 pm
Learning Lab
Leading across the generations in cybersecurity
Leadership is hard. Leadership in Cybersecurity is harder. Have you ever thought this or wondered if it was true? There are many reasons it might be true, but one certain reason is that we have 4 generations of workers in the Cybersecurity industry right now. And, the way we lead those in the older generations probably looks nothing like how we should be leading the youngest generation! In this session we will talk about those generational differences and dive into some proven, successful tactics on how to effectively lead your entire team, no matter how many generations you have represented.
7:20 pm - 9:30 pm
Gala Dinner
8:30 pm - 9:00 pm
Dinner Keynote
8:00 am - 8:40 am
Panel
It’s time to fight AI with AI
Despite only being three years into the decade, the 2020s has already cemented itself as a turning point in the artificial intelligence (AI) arms race — from the release of OpenAI’s ChatGPT and its subsequent GPT-4 model, to text-to-image generators Midjourney and DALL-E and countless other examples. These increasingly powerful AI tools and models have effectively made ‘work’ easier across all industries. From coding to writing — and other generative functions — AI is now being embraced by businesses and professionals around the globe. At the same time, cybercriminals have begun to take advantage of these tools for more nefarious means. With a new set of tools under their belt that can be deployed almost instantaneously, a new call for vigilance is needed to protect against the rise of these threats, fakes and imposters. So how do we fight AI with AI?
8:40 am - 9:10 am
Keynote
9:20 am - 10:20 pm
Roundtables
Track 1: Ransomware: Are you asking the right questions?
Ransomware has been one of the most insidious threats to organizations of all sizes and across all industries for years, showing no sign of slowing down. Cohesity's new research, which includes the views of over 900 IT and security decision-makers globally, underscores this growing menace. Nearly 80% of respondents reported their organization had fallen victim to a ransomware attack in the second half of 2023.
This roundtable will explore three pivotal discussion points:
- Evolution of ransomware tactics: How have ransomware techniques evolved, particularly in terms of encryption methods and evasion tactics? What innovative strategies are attackers using, and how can organizations anticipate and counteract these threats?
- Proactive Defense Measures: What proactive measures can organizations implement to stay one step ahead of ransomware attacks? This discussion will cover best practices in prevention, detection, and response to minimize risk and impact.
- Cost of Inaction: What are the potential consequences of failing to address the ransomware threat adequately? We'll explore the financial, operational, and reputational costs of inaction and emphasize the importance of a robust cybersecurity strategy.
Join us to gain valuable insights and strategies for defending against the relentless threat of ransomware.
Track 2: Safeguarding sata in the AI era
In the age of AI, data privacy and security have become more critical than ever. The vast amounts of data collected and processed by AI systems amplify the risk of data breaches, which can lead to significant trust issues and legal ramifications due to unauthorized access to sensitive information.
AI introduces additional complexities, including the risks of bias, discrimination, and hallucination. As privacy regulations become increasingly stringent, organizations must ensure their data governance practices not only comply with these regulations but also adapt to the rapid advancements in AI technology.
This roundtable will delve into three pivotal discussion points:
- Emerging Security and Privacy Threats: What new threats to data security and privacy are emerging in the age of AI, and how can we proactively address them to protect sensitive information?
- Balancing Innovation and Regulation: How can organizations strike a balance between fostering AI innovation and adhering to stringent privacy regulations? What best practices can help ensure security without stifling technological advancements?
- Ethical AI and Bias Mitigation: What strategies can be implemented to mitigate the risks of bias and discrimination in AI systems, ensuring ethical data use and enhancing trust among stakeholders?
Join this round table to explore these crucial issues and develop actionable insights to enhance data security in the dynamic landscape of AI.
Track 3: Risk busters: Navigating cyber threats with governance
Recent research from IBM indicates that data breaches now cost businesses an average of US$4.45 million annually, marking a 15% increase over the past three years. As organizations face challenges such as fragmented systems, rising third and fourth-party risks, and the rapid pace of technological change, it becomes imperative to adopt a comprehensive approach to governance, risk, and compliance in 2024.
This roundtable will explore three crucial discussion points:
- Strengthening Security Posture: How can organizations enhance their security measures to guard against the ever-evolving landscape of cyber threats and data breaches? What strategies are most effective in fortifying security?
- Achieving Greater Visibility: What methods can be employed to gain better visibility across both internal operations and the broader ecosystem? How can organizations ensure they have a clear and comprehensive view of potential risks?
- Leveraging Emerging Tools: How can emerging tools and methodologies be utilized to maximize efficiency and effectiveness in governance, risk, and compliance? What innovations should organizations consider to do more with less?
Join this round table to uncover actionable insights and strategies to bolster your organization’s security posture and navigate the complexities of today's risk landscape.
12:45 pm - 1:10 pm
Closing Keynote
Midnight worries: Navigating headline fears and liability with confidence
What keeps CISOs and cyber leaders awake at night? Is it the dread of seeing their organization in the headlines due to a breach, or the fear of finding their own name amidst a public scandal? In an era where cybersecurity incidents can have profound legal and reputational repercussions, the stakes have never been higher. However, with the right approaches, we can navigate these challenges and steer our profession towards a brighter future, delivering great security for our organizations.
Join Joe Sullivan, a seasoned cybersecurity expert, as he delves into the complexities of leadership and liability in today's digital landscape. This interactive session will feature real-world scenarios and audience participation, providing you with practical strategies to manage risks and protect your organization—and yourself—from becoming the next headline. Together, we will explore how to turn midnight worries into opportunities for resilience and growth.
1:10 pm - 1:30 pm
Beyond the Challenges
![](https://gdsgroup.com/app/uploads/2024/04/Ritz-Carlton-Tiburon-Naples-FL-800x534.jpg)
Ritz Carlton Naples, Tiburon, FL
Nestled among native wetlands and migratory bird preserves The Ritz-Carlton Naples, Tiburón offers a sanctuary with serene spaces.
![](https://gdsgroup.com/app/uploads/2023/11/why-attend-background.jpg)
Why attend?
Connect with like-minded senior leaders for a curated agenda, focused on tackling your current business critical challenges and driving industry forward.
Be a part of exclusive shared learning, horizon scanning and actionable insights enabling organizations to deliver transformative strategies.
Build meaningful relationships with solution providers matched to your business priorities to help accelerate your projects and deliver your objectives.