










Security Digital Summit
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.
Why Attend
New connections
Build new connections with likeminded senior leaders
Business trends
Stay current with emerging business trends
Key takeaways
Downloadable and actionable takeaways
New partnerships
Accelerate key projects through meaningful new partnerships
Insights
De-risk new projects by gaining a broad range of insights
New technologies
Understand the impact new technology can make















Trusted by
We host global organizations with the conversations that matter. That’s why we’re trusted by these top brands.
Past Programme
09:00 - 09:15
Opening Remarks
Intro & Diamond Commentary
09:15 - 09:45
Keynote
A Perspective on AI through a Cyber Security Lens
09:45 - 10:25
Panel Discussion
How to improve organisational learning after a cybersecurity incident?
•What is the key lesson you’ve seen organisations learn from cybersecurity incidents?
•What opportunities do you see for organisations to improve how they learn from cybersecurity incidents?
10:25 - 10:35
Insight Break
10:35 - 11:25
Roundtables
Track 1: Going on the offensive in a democratised age
The world of Hybrid work and accessing global talent pools demand that ever more distributed workers are given access to key data and tools and demand their employers trust them in the process. At the same time different functions who are desperate to take control of their digital destinies to create better customer solutions faster. How can security leaders meet the future of Cyber war head on as organisations seek to build a culture of trust, democratisation and customer centric responsiveness.
Track 2: Preparing for the Security Savvy Board
Understanding locks, keys and cameras to protect critical infrastructure has always been easy for boards to appreciate and justify. Yet as security threats have moved further into the cyberspace and becoming increasingly complex it has been harder for boards to know how effective information security officers are being. That is all changing. After the pandemic boards are giving a mandate of organisational resilience and are looking to create a brand that drives effective security culture.
Track 3: The Challenges Around Securing Software Supply Chains
By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, requires organizations to take action to ensure the security and integrity of their software. But this is easier said than done. This roundtable explores the following key topics:
•How the software supply chain is becoming more complex and a greater attack vector
•Explore new challenges that this complexity is creating as well as new regulatory obstacles
•Mitigation strategies throughout the software development processes and environment
11:25 - 11:30
Short Break
11:30 - 12:10
Masterclass Breakouts
12:11 - 12:41
Headline Keynote
Staying Secure in the Midst of a Talent Crisis
CrisisThe worldwide cyber talent shortage is real and growing. Just in the US, the Labor Department estimates 600,000 more openings than qualified professionals. Globally, the gap is 2.7 million. The lack of skilled practitioners is leaving vulnerabilities unpatched and organizations dangerously exposed. But effective and innovative solutions can bridge the talent gap and address both near term and longer term needs.
In this session, we’ll explore:
•Current options to increase the cyber talent capacity required to meet organizations’ current and future security needs
•Broadening the diversity of available security skill sets to cover the full scope of vulnerabilities for on-premise, cloud, networking, hosts, mobile, applications, etc
•The challenges, and importance, of establishing a continuous testing practice to keep pace with the continuous application development and deployment methodologies
•The advantages of leveraging crowdsourcing as part of your security operations.
•The importance of standard testing frameworks and operational transparency in leveraging untapped and available security talent
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
The Open Source Security Journey - from cynic to disciple
Open source is seen as a key catalyst of innovation and cost saving as organisations move towards democratised access to IT and citizen development. Realising the benefits of open source while staying safe is a complicated process and in this panel we will share view points from organisations that are at different stage of their journey.
09:40 - 10:20
Panel Discussion
How cloud threats in 2021 have evolved our security strategy
Join Nico from Wiz & Frank from 1600 Cyber as they review the most notable cloud threats in 2021 and how their key learnings impact cloud security strategy in 2022. Last year proved to be another year of massive disruption on many levels. For security teams the impact was even more profound as cloud risks grew more complicated. Looking back at the most notable ones, like Log4J, it becomes clear current approaches create more work than results.
10:20 - 10:30
Insight Break
10:35 - 11:25
Roundtables
Track 1: Going on the offensive in a democratised age
The world of Hybrid work and accessing global talent pools demand that ever more distributed workers are given access to key data and tools and demand their employers trust them in the process. At the same time different functions who are desperate to take control of their digital destinies to create better customer solutions faster. How can security leaders meet the future of Cyber war head on as organisations seek to build a culture of trust, democratisation and customer centric responsiveness.
Track 2: Preparing for the Security Savvy Board
Understanding locks, keys and cameras to protect critical infrastructure has always been easy for boards to appreciate and justify. Yet as security threats have moved further into the cyberspace and becoming increasingly complex it has been harder for boards to know how effective information security officers are being. That is all changing. After the pandemic boards are giving a mandate of organisational resilience and are looking to create a brand that drives effective security culture.
Track 3: The Challenges Around Securing Software Supply Chains
By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, requires organizations to take action to ensure the security and integrity of their software. But this is easier said than done. This roundtable explores the following key topics:
•How the software supply chain is becoming more complex and a greater attack vector
•Explore new challenges that this complexity is creating as well as new regulatory obstacles
•Mitigation strategies throughout the software development processes and environment
11:25 - 11:55
Innovation Exchange Keynote
In the Fight With You
Choosing technology is often about looking for a reliable technology partner. But, in IT Security you need more than that, you need a Partner that will join in the fight with you and turn any unfair fight into a fairer one.
This keynote looks at how it’s vital to have Partner that not only helps you technically to even up the playing field between you and your adversaries - but offers some other key support that you should consider with any Partners you chose to be in the fight with you?
11:58 - 12:30
Closing Prime Keynote
The importance of resilience after a breach in today's threat landscape
As the volume, speed and sophistication of cyber threats increases against an expanding enterprise attack surface, 100% breach prevention is unrealistic.
09:00 - 09:10
Opening Remarks
09:10 - 09:40
Keynote
Can You Trust the Cloud with Your Sensitive Data?
Data is the lifeblood of any organization. However, many organizations have difficulty understanding where all of their sensitive data is located, and what additional protection and access controls they should implement, so that they remain compliant with relevant data privacy and data sovereignty regulations. The lack of clear solutions often means that sensitive and personally identifiable data remains on-premises, which increases operational cost, reduces data value and slows down the planned digital transformation.
In this keynote, we will cover:
•Key challenges organizations typically face in trusting Hyperscalers with their sensitive data.
•Highlight the importance of controlling digital sovereignty early on in the journey to cloud.
•Show how adopting a Discover, Protect and Control methodology can help CISOs and DPOs leverage compliance as a business enabler and drive greater cloud adoption.
•Share lessons learned from several customer success stories in which sensitive workload migrations were unblocked at various stages in the journey to cloud using a risk-based approach.
09:40 - 10:20
Panel Discussion
The Modern CISO’s API Security Strategy
In 2011 Venture Capitalist Marc Andreessen wrote his seminal WSJ article titled “Why Software Is Eating The World”, today it is clear that API are fueling that software and securing them is paramount. Successful digital transformation, increased multi-cloud adoption, automation, and policies and initiatives like Open Banking and Gaia-X have given rise to the general adoption of APIs in most enterprises. We must take appropriate steps to ensure we can continue to drive innovation securely.
10:20 - 10:30
Insight Break
10:30 - 11:20
Roundtable Leaders Panel
11:30 - 12:00
Innovation Exchange Keynote
The changing landscape of 3rd party risk
Every day, businesses experience cybersecurity incidents that can become disruptive, costly, and significantly damage their reputation. Large companies at the center of vast data ecosystems, however, face a particularly thorny problem: managing cyber and privacy risks around information that travels to third parties and beyond. This panel explores the shifting challenges from security leaders who work as clients and thrid party providers.
12:00 - 12:30
Closing Keynote
Start left in software security with secure design
12:30 - 12:40
Insight Break -Closing Comments
An immersive
event experience
interactive features including:
Audience Interaction
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
Interactive Live Polling
Keep engaged through interactive live polling and gamification tools.
Direct connections
Ask your questions face-to-face with the speakers via our leading stage technology.
Relationship building
Build stronger connections with leading executives that you will take with you through your career
Thought Leadership
Content and insight from industry experts when it matters most
Intelligent interaction
Interactive quizzes gamify your experience
Have a question…
There is no cost associated with attending a GDS Summit. In return, we ask that all senior executives in participation attend for the full duration to ensure that all attendees get maximum value and insight from the interactive roundtables, live Q&As and breakout networking sessions.
Our digital summit portfolio is designed to bring together senior decision makers from large global businesses and innovative disruptor brands to drive industry forward through addressing business critical challenges collaboratively.
If you’re keen to build new connections with likeminded leaders, de-risk your projects through new insight and establish new partnerships that can accelerate your projects then apply to attend today.
Complete our form below if you’re interested in attending the summit and you meet our application criteria. A member of the GDS team will then reach out to run you through the programme and event format and discuss your participation.
On stage: co-host a panel discussion with a group of likeminded senior executives or host a solo keynote presentation. Both slots include elements of interactive audience Q&A
Off stage: become a roundtable moderator, leading the discussion with the same cohort of executives for the duration of the summit around a specific topic you’ve agreed to focus on during the roundtable session.
We can tailor a partnership package to help meet your business objectives. This might include brand awareness, driving traffic to your site or quality editorial content via exclusive interviews and Q&As with our executive audience. Enquire today for more information.