
















Improved security for business resilience
Security leaders are having to be more proactive in meeting the growing complexity of the cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, security leaders will have to strike a careful balance.
Why Attend
New connections
Build new connections with likeminded senior leaders
Business trends
Stay current with emerging business trends
Key takeaways
Downloadable and actionable takeaways
New partnerships
Accelerate key projects through meaningful new partnerships
Insights
De-risk new projects by gaining a broad range of insights
New technologies
Understand the impact new technology can make



















Event Agenda
09:00 - 09:10
Opening Remarks
Intro & diamond commentary
09:10 - 09:40
Keynote
Using strategic security testing to transform your security posture
Most security testing today is purely tactical - we find vulnerabilities and sometimes fix them. We use this process to satisfy compliance requirements and report point-in-time status to regulators, but we rarely learn anything about our overall security posture and use that information to change our strategy and priorities. Strategic, transformational security testing is the solution.
Strategic security testing starts with aligning the testing program to the risk profile of systems and applications. New comprehensive, adversarial pentesting approaches allow business units to innovate at speed and with confidence.
Strategic security testing can also use aggregated data from individual penetration tests to reveal the root cause of persistent weaknesses in security posture due to broken processes and overwhelmed staff. Security and IT management use that data to invest in training and solutions that are specifically targeted at organizational deficiencies. Moreover, a strategic security testing program will track improvements in overall security posture over time so those improvements can be communicated to senior leadership and the board.
09:45 - 10:20
Panel Discussion
Ai and Cybercrime unleash a new era of menacing threats, are you ready for them?
Forrester Artificial intelligence (AI) is catching a lot of headlines recently. Large language models (LLMs) like OpenAI’s ChatGPT, Microsoft’s Bing Chat and Google’s Bard AI keep surprising us with their unique language-processing capabilities.
It seems like these projects keep getting better with each passing day, and the fact that anyone can have access to them is a great thing. However, this also brings very concerning threats.
Since everyone has access to these tools, nothing is stopping cyber criminals from utilizing AI’s advanced capabilities to their benefit.
Knowing where and how criminals conduct business allows organizations to monitor and analyze much of their activity, and this information helps defenders assess their organization's risk more accurately and protect themselves against attack.
10:20 - 10:30
Insight Break
How generative AI is democratizing cloud security
10:30 - 11:30
Roundtables
Track 1: The human factor in cybersecurity: A cyberpsychology shift
88% of security breaches have human error at their core, according to research from Stanford University. The human being in the attack chain is seen as an easy, low-hanging no-hack option, to infiltrate a network and carry out a destructive and often financially lucrative cyber-attack.
The challenge is to ensure that anyone who interacts with the digital realm understands how cybersecurity works. The problem then stems from the ‘plug-and-play’ view of technology, instilled in human behavior as digital technology has evolved over the decades. Cybersecurity behavior is then seen as a ‘blocker’, something that adds an extra burden on the human user. Enter Cyberpsychology! The basis of the discipline is to develop human-oriented systems for a given type of technological area. Cyberpsychology applies to home, work and work from anywhere environments.
Track 2: Navigating the privacy revolution: Anticipating the impact of evolving regulations
The modern attack surface is ever-expanding. Organizations are finding it increasingly difficult to keep up with the incredible scale of changes in their IT environment, while the expansion of cloud adoption has enabled businesses to move faster than ever before. However, this also implies that the attack surface is available to attackers and cybercriminals. For global organizations, there is a continuous risk of shadow IT introduction.
Discovering how to adapt to evolving business needs, complex technology landscapes and expanding attack surfaces is extremely important in the current scenario. In the context of expanding attack surfaces, how can organizations strike a balance between innovation and security?
Track 3: From threat to ally: The role of AI in revolutionizing cybersecurity
Sponsor:
Hackers are leveraging artificial intelligence and machine learning to add an additional layer of sophistication to their attacks, which means organizations need to move beyond the traditional and into the extraordinary when it comes to defending themselves. This includes investing in technologies such as threat detection and response, encryption, and multifactor authentication. But the question is "How can artificial intelligence help cybersecurity strategy today?”
How can organizations strike the right balance between AI automation and human expertise in cybersecurity operations? What are the key decision points for determining when human intervention is necessary?
11:30 - 11:50
Debate
The future of work with generative AI: Limitless potential or limitless risk?
Irrespective of whether employees are working remotely, in the office, or hybrid, global leaders need to continue to create a culture of collaboration and innovation. Generative AI platforms such as Chat GPT have the potential to revolutionize the world of programming by automating repetitive tasks, improving code quality, and increasing productivity. However, technology also presents challenges, including data privacy, model bias, lack of creativity, and technical difficulties. How can organizations embrace such tools whilst navigating potential risks? Are we faced with limitless possibilities here, or limitless risk?
During this session, two industry leaders will debate the transformative potential and the risks that come with Next-Gen Technology, particularly generative AI, in shaping the future of work.
11:55 - 12:25
Headline Keynote
Data protection, treat the problem not the symptom
Security teams spend years trying to roll out products, as data security solutions like DLP, WAF, DSPM, API Sec, etc must deal with an ever changing attack surface and evolving threats. These solutions focus teams on the symptoms as opposed to the root cause: the underlying data stores lacking the right protective controls. In this talk, Solomon will share his experience running security programs that focus on protecting the underlying data stores to achieve extremely high RoI and agility.
09:00 - 09:10
Opening Remarks
09:10 - 09:50
Panel
Trust transformed: Embracing zero trust architecture for unparalleled data protection
In an era dominated by relentless cyber threats and data breaches, organizations are revolutionizing their data protection strategies by embracing zero trust architecture. Departing from traditional security models, zero trust architecture adopts a dynamic and granular approach that challenges the notion of trust within networks. By continuously verifying user identity and access, regardless of location or network environment, organizations can fortify their defenses and elevate data protection to unprecedented levels.
The journey to implementing zero trust architecture demands careful planning, collaboration, and investment. Organizations must conduct thorough security assessments, foster a security-aware culture through employee training, and ensure seamless interoperability between various security solutions..
09:55 - 10:05
Insight Break
In the increasingly complex world of cybersecurity, how do you know what you “know”?
In the 21st century, the attack surface has expanded far beyond workstations and servers. There are IoT devices, ephemeral assets; building management systems, industrial control systems, virtual devices in the public and private cloud; even seemingly innocuous consumer devices now run modern operating systems on surprisingly advanced low-end processors. How do you know how effectively your current security stack protects you against the unknown and how do you know what you don’t know?
10:05 - 11:05
Roundtables
Track 1: The human factor in cybersecurity: A cyberpsychology shift
88% of security breaches have human error at their core, according to research from Stanford University. The human being in the attack chain is seen as an easy, low-hanging no-hack option, to infiltrate a network and carry out a destructive and often financially lucrative cyber-attack.
The challenge is to ensure that anyone who interacts with the digital realm understands how cybersecurity works. The problem then stems from the ‘plug-and-play’ view of technology, instilled in human behavior as digital technology has evolved over the decades. Cybersecurity behavior is then seen as a ‘blocker’, something that adds an extra burden on the human user. Enter Cyberpsychology! The basis of the discipline is to develop human-oriented systems for a given type of technological area. Cyberpsychology applies to home, work and work from anywhere environments.
Track 2: Navigating the privacy revolution: Anticipating the impact of evolving regulations
The modern attack surface is ever-expanding. Organizations are finding it increasingly difficult to keep up with the incredible scale of changes in their IT environment, while the expansion of cloud adoption has enabled businesses to move faster than ever before. However, this also implies that the attack surface is available to attackers and cybercriminals. For global organizations, there is a continuous risk of shadow IT introduction.
Discovering how to adapt to evolving business needs, complex technology landscapes and expanding attack surfaces is extremely important in the current scenario. In the context of expanding attack surfaces, how can organizations strike a balance between innovation and security?
Track 3: From threat to ally: The role of AI in revolutionizing cybersecurity
Sponsor:
Hackers are leveraging artificial intelligence and machine learning to add an additional layer of sophistication to their attacks, which means organizations need to move beyond the traditional and into the extraordinary when it comes to defending themselves. This includes investing in technologies such as threat detection and response, encryption, and multifactor authentication. But the question is "How can artificial intelligence help cybersecurity strategy today?”
How can organizations strike the right balance between AI automation and human expertise in cybersecurity operations? What are the key decision points for determining when human intervention is necessary?
11:10 - 11:35
Innovation Exchange Keynote
Cybersecurity leaders suffer burnout as pressures of the job intensify
Hacks on companies’ IT systems often come with business disruptions, reputational damage, regulatory investigations, and lawsuits. Chief information security officers must manage cybersecurity risks and, at the same time, educate C-suite colleagues and the board. Three in four CISOs in the U.S. report feeling burned out, putting them at risk of quitting. Are CISO’s and their teams getting the support they need?
11:35 - 12:05
Closing Keynote
Generative AI – powering the next generation of Security Engineers, Analysts
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
Putting patient safety first – Healthcare in the digital age
Health care is an ever evolving field, with physicians, nurses and care team members continually integrating new therapies and scientific advancements. Many of those innovations require adopting new digital technologies, but therein lies one of the most profound challenges of the modern health care age: how to evolve while safeguarding the digital health care landscape.
09:45 - 09:55
Insight Break
The good, the bad and the scary – Yep! There’s an AI for that
In this brief overview of AI and the explosion of LLM’s we discuss why machine learning and AI has become such a big deal…it’s been around since the 50’s. We will briefly discuss how AI is/will be used by cybercriminals and cyber defenders (we’ve been using machine learning for nearly ten years) and instead of the proverbial ‘slideshow’ we will actually show several AI resources and tools you can use.
09:55 - 10:25
Masterclass
10:30 - 11:20
Roundtable Leaders Panel
11:20 - 11:45
Closing Keynote
Opening the talent spigot, for your digital security future
11:45 - 11:55
5 Key Takeaways
An immersive
Digital Summit
interactive features including:
Audience Interaction
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
Interactive Live Polling
Keep engaged through interactive live polling and gamification tools.
Direct connections
Ask your questions face-to-face with the speakers via our leading stage technology.
Relationship building
Build stronger connections with leading executives that you will take with you through your career
Thought Leadership
Content and insight from industry experts when it matters most
Intelligent interaction
Interactive quizzes gamify your experience
Apply to attend
Meet with fellow industry leaders and solve today’s greatest business challenges.
Thank you for your interest. One of the team will be in touch soon.
Frequently asked questions
A Digital Summit from GDS Group is a 3-day event experience bringing multiple partners and senior decision makers together. Within this immersive enviroment they discover new technical solutions, share learning opportunities and discuss trending industry topics which boosts insight, conversation and connections.
There are a couple of ways you can participate in a GDS event experience; as a partner or as an attendee. Whichever you are interested in, do get in touch.
Global senior decision makers from leading industry brands attend our event experiences. Between 2020 to May 2023, 34,473 senior executives attended our event experiences. If you are interested in attending a GDS event experience, please check out our upcoming events.
At one of our GDS Digital Summits there are several speaking slot packages available for you – 2x power insights commentator slots, keynote panel seats, masterclass hosting, prime keynote slot, and headline keynote slot.
Get in touch with us to learn more.
Yes! We partner with leading brands all across the globe – for partnership opportunities please get in touch.