










Security Digital Summit
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.
Why Attend
New connections
Build new connections with likeminded senior leaders
Business trends
Stay current with emerging business trends
Key takeaways
Downloadable and actionable takeaways
New partnerships
Accelerate key projects through meaningful new partnerships
Insights
De-risk new projects by gaining a broad range of insights
New technologies
Understand the impact new technology can make
















Event Agenda
09:00 - 09:15
Opening Remarks
Intro & Diamond Commentary
09:15 - 09:45
Keynote
09:45 - 10:25
Panel Discussion
Breaking barriers: Harnessing innovation to combat third-party security risks
Forrester Research believes that 60% of security incidents this year will result from issues with third parties, with many of these risks being identified after initial onboarding. As with any cyber security incident, they are not only costly and disruptive, but can cause considerable damage to businesses reputation.
This highlights the need for organizations to act to ensure the security and integrity of their partner ecosystem. And, as these ecosystems become more diverse and dynamic, organizations must continue to innovate ways of monitoring and collaborating with these critical business partners. Join leaders from a variety of organizations and industries as they discuss their journey and the challenges, they face working with 3rd party providers.
10:25 - 10:35
Insight Break
10:35 - 11:25
Roundtables
Track 1: Defending the digital frontier: Exploring the impact of AI and ML on cybersecurity
As technology continues to advance at an unprecedented pace, cyber security leaders are faced with the daunting task of safeguarding their organizations' digital assets and infrastructure. In 2023, although it is only Summer, the impact of emerging technologies including artificial intelligence/machine learning, 5G, IoT, and quantum are significantly impacting everything connected to the internet.
The introduction of these potentially disruptive technologies has huge implications on cybersecurity. By examining the challenges and opportunities presented by these technologies, participants will gain insights into developing effective strategies to ensure robust security measures in this rapidly evolving digital age.
Join this roundtable to discuss the following points:
• How can AI and ML enhance cybersecurity practices, such as threat detection, anomaly detection, and incident response?
• What are the potential risks associated with AI and ML in cybersecurity, including adversarial attacks and biased algorithms?
• How can organizations strike a balance between leveraging AI and ML for enhanced security while addressing privacy concerns?
• How can organizations leverage the synergies between emerging technologies to strengthen their overall cybersecurity posture?
• What are the challenges in integrating AI, ML, 5G, IoT, and quantum technologies within existing cybersecurity frameworks?
• What are the ethical considerations surrounding the use of emerging technologies in cybersecurity, and how can organizations address them?
Track 2: Bridging the gap: Addressing the skills shortage threatening cloud security
The concept of digital transformation has been with us for a decade now, and it has become the driving force behind the IT efforts of most enterprises and always involves multicloud deployments. In fact, 71% of respondents to a recent IBM survey agreed that it is “difficult to realize the full potential of a digital transformation” without a multicloud strategy. At the same time, 41% of the executives do not think their security initiatives have kept up with digital transformation.
One of the primary roadblocks to implementing a strong cloud security posture is the fact that each major public cloud platform uses a different approach and tools for protecting its infrastructure. For example, AWS, Azure and GCP do not handle basic security functions such as identity and access management (IAM), privileged access management and VPNs in the same way. There are nuances that must be considered for security measures to work properly. The professionals who understand these nuances are not easy to find. Is this where the talent crunch meets the budget crunch? There are few organizations that are not suffering from a lack of skilled security personnel, and the competition for talent is intense. Whilst corporations tighten their purse strings and talent is scarce how can cloud providers better collaborate with their customers during this challenging landscape?
Join this roundtable to discuss the following points:
• How would you describe the current state of the skills shortage in cloud security? What are the specific challenges organizations face in finding and retaining skilled professionals?
• What are the key skills and expertise required to effectively manage cloud security? Are there any emerging areas or specialized roles that are becoming increasingly critical?
• What role can automation, artificial intelligence, and machine learning play in mitigating the skills shortage? How can these technologies enhance the capabilities of security teams and streamline cloud security operations?
• Looking to the future, what trends and technologies should organizations consider when developing their cloud security strategies? How can they prepare for the evolving threat landscape and the changing skill requirements?
• In the context of the skills shortage, how can organizations effectively balance outsourcing or partnering with third-party providers while maintaining control and ensuring the security of their cloud environments?
• Are there any regulatory or compliance considerations that must be considered when addressing the skills shortage in cloud security? How can organizations meet these requirements effectively?
• During a skills shortage shared responsibility has never been more prevalent, so how can cloud providers support businesses to navigate the complexities of cloud security, foster a proactive and cooperative approach to mitigate risks effectively?
Track 3: Cyber resilience: Strengthening governance, risk, and compliance practices against cyber threats
While governance, risk, and compliance were once seen as the organization's police - reacting to violations, misconduct, or other wrongdoing- that is no longer the case. Without a robust GRC framework that includes ESG, resiliency and strong cyber and compliance programs, there is a serious risk to a company’s reputation and its ability to attract and retain the best talent and customers. A well-planned GRC strategy comes with lots of benefits: improved decision-making, more optimal IT investments, elimination of silos, and reduced fragmentation among divisions and departments, to name a few.
The stakes have been raised and there are no more excuses. The uncertainties and challenges faced by organizations will only escalate with ongoing technological advancements, a volatile economic and geopolitical landscape, mounting regulations, evolving environmental and social factors, and more.
Join this roundtable to discuss the following questions:
• How can organizations establish a comprehensive GRC framework that incorporates cyber resilience as a critical component?
• What are the key elements of an effective cyber resilience strategy, and how can they be integrated into existing governance, risk, and compliance practices?
• Considering evolving environmental and social factors, how can cyber resilience efforts be aligned with environmental sustainability and corporate social responsibility goals?
• What are the potential consequences for organizations that fail to prioritize cyber resilience within their GRC practices, particularly in terms of reputation, talent acquisition, and customer trust?
• How can cyber resilience initiatives be effectively communicated to stakeholders, including the board of directors, senior management, employees, and customers?
• What role should the C-suite play in driving cyber resilience and strengthening governance, risk, and compliance practices within an organization?
• With ongoing technological advancements, how can organizations ensure that their cyber resilience strategies remain adaptable and responsive to emerging cyber threats?
• What are the challenges and opportunities associated with incorporating cyber resilience into the governance, risk, and compliance practices of multinational organizations with diverse regulatory environments?
• How can organizations effectively collaborate with external stakeholders, such as government agencies, industry associations, and cybersecurity vendors, to enhance cyber resilience and address common challenges?
• What metrics and key performance indicators (KPIs) should organizations use to measure the effectiveness of their cyber resilience efforts and the overall strength of their GRC practices?
11:25 - 11:30
Short Break
11:30 - 12:00
Masterclass Breakouts
Personal information: Data masking/anonymization from document to IoT
The introduction of GDPR has highlighted concerns about keeping personal data safe, and how some tech giants have built business models based on our likes and dislikes. Anonymization/Data Masking has become a need for organizations seeking to stay compliant and those in charge of ethical monetization.
Manuel will review the impact of the various privacy laws and regulations, use cases, available technology, and the growing concern about our personal data being shared with the advent of increasingly more IoT devices and 5G/mobility.
12:01 - 12:31
Headline Keynote
Enable resilient security posture with strategic security testing.
Most security testing today is purely tactical. We find vulnerabilities and sometimes fix them. We use this process to satisfy compliance requirements and report a point-in-time status to regulators, but we rarely learn anything about our overall security posture and use that information to change our strategy and priorities. Strategic, transformational security testing is the solution to a more resilient posture in today's threat landscape.
Strategic security testing uses aggregated data from individual penetration tests to reveal the root cause of persistent weaknesses in security posture due to broken processes and overwhelmed staff. Security and IT management can use that data to invest in training and solutions that are specifically targeted at organizational deficiencies. Moreover, a strategic security testing program will track improvements in overall security posture over time so those improvements can be communicated to senior leadership and the board.
09:00 - 09:15
Opening Remarks
09:15 - 09:45
Keynote
The human firewall: Nurturing a cybersecurity culture for the future
In this keynote, we explore the vital role of individuals in safeguarding our digital landscape. As cyber threats continue to evolve, technology alone cannot provide fool proof protection. It is the human firewall that becomes paramount.
During this session we will hear from Chris Lockery, CISO, Help at Home and learn how organizations can foster a cybersecurity culture that empowers employees to become the first line of defense. Uncover strategies to cultivate awareness, develop best practices, and build resilience in the face of ever-evolving threats.
09:47 - 10:27
Panel Discussion
Leadership innovation: Recruit, retain and develop diverse IT security talent
Organizations are rapidly realizing the benefits of a diverse workforce. Despite their best efforts to attract a range of talent, many CISOs and other IT security leaders are concerned that they are failing to meet even their basic staffing goals. Why? In this panel session, we will explore best practices that will attract and retain the right candidates.
10:27 - 10:37
Insight Break
10:40 - 11:30
Roundtables
Track 1: Defending the digital frontier: Exploring the impact of AI and ML on cybersecurity
As technology continues to advance at an unprecedented pace, cyber security leaders are faced with the daunting task of safeguarding their organizations' digital assets and infrastructure. In 2023, although it is only Summer, the impact of emerging technologies including artificial intelligence/machine learning, 5G, IoT, and quantum are significantly impacting everything connected to the internet.
The introduction of these potentially disruptive technologies has huge implications on cybersecurity. By examining the challenges and opportunities presented by these technologies, participants will gain insights into developing effective strategies to ensure robust security measures in this rapidly evolving digital age.
Join this roundtable to discuss the following points:
• How can AI and ML enhance cybersecurity practices, such as threat detection, anomaly detection, and incident response?
• What are the potential risks associated with AI and ML in cybersecurity, including adversarial attacks and biased algorithms?
• How can organizations strike a balance between leveraging AI and ML for enhanced security while addressing privacy concerns?
• How can organizations leverage the synergies between emerging technologies to strengthen their overall cybersecurity posture?
• What are the challenges in integrating AI, ML, 5G, IoT, and quantum technologies within existing cybersecurity frameworks?
• What are the ethical considerations surrounding the use of emerging technologies in cybersecurity, and how can organizations address them?
Track 2: Bridging the gap: Addressing the skills shortage threatening cloud security
The concept of digital transformation has been with us for a decade now, and it has become the driving force behind the IT efforts of most enterprises and always involves multicloud deployments. In fact, 71% of respondents to a recent IBM survey agreed that it is “difficult to realize the full potential of a digital transformation” without a multicloud strategy. At the same time, 41% of the executives do not think their security initiatives have kept up with digital transformation.
One of the primary roadblocks to implementing a strong cloud security posture is the fact that each major public cloud platform uses a different approach and tools for protecting its infrastructure. For example, AWS, Azure and GCP do not handle basic security functions such as identity and access management (IAM), privileged access management and VPNs in the same way. There are nuances that must be considered for security measures to work properly. The professionals who understand these nuances are not easy to find. Is this where the talent crunch meets the budget crunch? There are few organizations that are not suffering from a lack of skilled security personnel, and the competition for talent is intense. Whilst corporations tighten their purse strings and talent is scarce how can cloud providers better collaborate with their customers during this challenging landscape?
Join this roundtable to discuss the following points:
• How would you describe the current state of the skills shortage in cloud security? What are the specific challenges organizations face in finding and retaining skilled professionals?
• What are the key skills and expertise required to effectively manage cloud security? Are there any emerging areas or specialized roles that are becoming increasingly critical?
• What role can automation, artificial intelligence, and machine learning play in mitigating the skills shortage? How can these technologies enhance the capabilities of security teams and streamline cloud security operations?
• Looking to the future, what trends and technologies should organizations consider when developing their cloud security strategies? How can they prepare for the evolving threat landscape and the changing skill requirements?
• In the context of the skills shortage, how can organizations effectively balance outsourcing or partnering with third-party providers while maintaining control and ensuring the security of their cloud environments?
• Are there any regulatory or compliance considerations that must be considered when addressing the skills shortage in cloud security? How can organizations meet these requirements effectively?
• During a skills shortage shared responsibility has never been more prevalent, so how can cloud providers support businesses to navigate the complexities of cloud security, foster a proactive and cooperative approach to mitigate risks effectively?
Track 3: Cyber resilience: Strengthening governance, risk, and compliance practices against cyber threats
While governance, risk, and compliance were once seen as the organization's police - reacting to violations, misconduct, or other wrongdoing- that is no longer the case. Without a robust GRC framework that includes ESG, resiliency and strong cyber and compliance programs, there is a serious risk to a company’s reputation and its ability to attract and retain the best talent and customers. A well-planned GRC strategy comes with lots of benefits: improved decision-making, more optimal IT investments, elimination of silos, and reduced fragmentation among divisions and departments, to name a few.
The stakes have been raised and there are no more excuses. The uncertainties and challenges faced by organizations will only escalate with ongoing technological advancements, a volatile economic and geopolitical landscape, mounting regulations, evolving environmental and social factors, and more.
Join this roundtable to discuss the following questions:
• How can organizations establish a comprehensive GRC framework that incorporates cyber resilience as a critical component?
• What are the key elements of an effective cyber resilience strategy, and how can they be integrated into existing governance, risk, and compliance practices?
• Considering evolving environmental and social factors, how can cyber resilience efforts be aligned with environmental sustainability and corporate social responsibility goals?
• What are the potential consequences for organizations that fail to prioritize cyber resilience within their GRC practices, particularly in terms of reputation, talent acquisition, and customer trust?
• How can cyber resilience initiatives be effectively communicated to stakeholders, including the board of directors, senior management, employees, and customers?
• What role should the C-suite play in driving cyber resilience and strengthening governance, risk, and compliance practices within an organization?
• With ongoing technological advancements, how can organizations ensure that their cyber resilience strategies remain adaptable and responsive to emerging cyber threats?
• What are the challenges and opportunities associated with incorporating cyber resilience into the governance, risk, and compliance practices of multinational organizations with diverse regulatory environments?
• How can organizations effectively collaborate with external stakeholders, such as government agencies, industry associations, and cybersecurity vendors, to enhance cyber resilience and address common challenges?
• What metrics and key performance indicators (KPIs) should organizations use to measure the effectiveness of their cyber resilience efforts and the overall strength of their GRC practices?
11:31 - 12:01
Innovation Exchange Keynote
12:03 - 12:33
Closing Prime Keynote
09:00 - 09:15
Opening Remarks
09:15 - 09:45
Keynote
09:46 - 10:26
Panel Discussion
The future of cybersecurity amid digital transformation
Reliable and resilient digital transformation can only be achieved when it has a foundation of cybersecurity beneath it. CIOs and CTOs often transform business solutions to enable the business using tools such as artificial intelligence (AI) and Internet of Things (IoT). But with these tools comes new or increased cybersecurity and technology risks.
By sidestepping cybersecurity in a rush to digitalize, organizations, employees and their customers are left exposed. Digital transformation without cybersecurity is a recipe for disaster so how can security leaders go about deciding the most effective path forward?
10:27 - 10:37
Insight Break
10:37 - 11:32
Roundtable Leaders Panel
11:35 - 12:05
Innovation Exchange Keynote
Preparing for cybersecurity expertise on boards: Building the foundation for future opportunities
With the recent SEC proposal enforcing the inclusion of cybersecurity expertise on boards, a surge in demand for CISOs joining public company boards has emerged. This trend is expected to extend to private companies and non-profit organizations.
Andrew Wilder, Adjunct Professor of Cybersecurity at Washington University will delve into the implications of this proposal and explore the growing demand for CISOs in boardroom positions. Also examining the benefits that cybersecurity expertise brings to boards, including informed decision-making, robust risk management, and effective incident response capabilities. Not a session to be missed!
12:06 - 12:36
Closing Keynote
12:41 - 12:51
Insight Break -Closing Comments
An immersive
event experience
interactive features including:
Audience Interaction
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
Interactive Live Polling
Keep engaged through interactive live polling and gamification tools.
Direct connections
Ask your questions face-to-face with the speakers via our leading stage technology.
Relationship building
Build stronger connections with leading executives that you will take with you through your career
Thought Leadership
Content and insight from industry experts when it matters most
Intelligent interaction
Interactive quizzes gamify your experience
Have a question…
There is no cost associated with attending a GDS Summit. In return, we ask that all senior executives in participation attend for the full duration to ensure that all attendees get maximum value and insight from the interactive roundtables, live Q&As and breakout networking sessions.
Our digital summit portfolio is designed to bring together senior decision makers from large global businesses and innovative disruptor brands to drive industry forward through addressing business critical challenges collaboratively.
If you’re keen to build new connections with likeminded leaders, de-risk your projects through new insight and establish new partnerships that can accelerate your projects then apply to attend today.
Complete our form below if you’re interested in attending the summit and you meet our application criteria. A member of the GDS team will then reach out to run you through the programme and event format and discuss your participation.
On stage: co-host a panel discussion with a group of likeminded senior executives or host a solo keynote presentation. Both slots include elements of interactive audience Q&A
Off stage: become a roundtable moderator, leading the discussion with the same cohort of executives for the duration of the summit around a specific topic you’ve agreed to focus on during the roundtable session.
We can tailor a partnership package to help meet your business objectives. This might include brand awareness, driving traffic to your site or quality editorial content via exclusive interviews and Q&As with our executive audience. Enquire today for more information.