












Security Digital Summit
Embrace the Cybersecurity Evolution: Navigate the wave of change as generative AI booms, SEC introduces new rules, and advanced threats surge. CISOs lead through uncertainty, enhancing efficiency, productivity, and growth. Yet, technology alone won't suffice – it can expose your enterprise. Empower secure investments, elevate decisions, and fortify your business with our expert guidance.



















Event Agenda
09:00 - 09:15
Opening Remarks
Intro & diamond commentary
09:15 - 09:45
Keynote
Cybersecurity is a shared journey and a shared challenge that the entire nation must address together
Global cybersecurity is a community, but true and lasting security in cyberspace can only be achieved collaboratively. Government at all levels, industry, technology providers, the global community of cyber defenders, individual citizens, and others must all work together to achieve a secure cyber future.
09:45 - 10:25
Panel Discussion
Ai and cybercrime unleash a new era of menacing threats, are you ready for them?
Artificial intelligence (AI) is catching a lot of headlines recently. Large language models (LLMs) like OpenAI’s ChatGPT, Microsoft’s Bing Chat and Google’s Bard AI keep surprising us with their unique language-processing capabilities. Other generative AI applications like Midjourney, Dall-E or Stable Diffusion have blown our minds by creating jaw-dropping artwork just from a few sentence-long prompts.
It seems like these projects keep getting better with each passing day, and the fact that anyone can have access to them is a great thing. However, this also brings very concerning threats.
Since everyone has access to these tools, nothing is stopping cyber criminals from utilizing AI’s advanced capabilities to their benefit.
Knowing where and how criminals conduct business allows organizations to monitor and analyze much of their activity, and this information helps defenders assess their organization's risk more accurately and protect themselves against attack.
10:25 - 10:35
Insight Break
Why cloud security consolidation should be on your radar this year
Most organizations utilize at least 5 different cloud security tools. This not only results in inefficiencies, but the even bigger problem is that the more point solutions are used, the more the alert fatigue, and the higher the rate of false positives. In turn, this can lead to desensitization, burnout, and missed critical alerts. Why? Because these tools only look at siloed alerts, without taking the full context into account - making it impossible for them to understand which risks are truly critical and which ones are just noise. However, a single consolidated cloud security platform understands the full context of risks and how they can be combined to create dangerous attack paths to the organization’s crown jewels. This allows teams to prioritize their remediation efforts and make the greatest improvement in their cloud security
10:35 - 11:25
Roundtables
Track 1: From threat to ally: The role of AI in revolutionizing cybersecurity
Sponsor:
Hackers are leveraging artificial intelligence and machine learning to add an additional layer of sophistication to their attacks, which means organizations need to move beyond the traditional and into the extraordinary when it comes to defending themselves. This includes investing in technologies such as threat detection and response, encryption, and multifactor authentication. But the question is "How can artificial intelligence help cybersecurity strategy today?” AI has the potential to revolutionize cybersecurity by augmenting human capabilities, enhancing threat detection, and enabling proactive defense mechanisms. However, caution is essential while AI is a powerful ally, it should be wielded responsibly and ethically. There is a strong need for ongoing research, collaboration, and human expertise to ensure that AI remains a force for good in the ongoing battle against cyber threats.
In this round table discussion, experts from the field of cybersecurity will come together to explore the transformative impact of AI on the evolving landscape of digital security. Delving into the pivotal role that AI plays in shifting the paradigm from perceiving AI as a threat to harnessing its potential as a powerful ally in safeguarding our digital world.
Track 2: Threat proofing tomorrow: Unleashing cyber resilience through continuous exposure management
Sponsor:
The modern attack surface is ever-expanding. Organizations are finding it increasingly difficult to keep up with the incredible scale of changes in their IT environment, while the expansion of cloud adoption has enabled businesses to move faster than ever before. However, this also implies that the attack surface is available to attackers and cybercriminals. For global organizations, there is a continuous risk of shadow IT introduction.
Discovering how to adapt to evolving business needs, complex technology landscapes and expanding attack surfaces is extremely important in the current scenario.
Track 3: Bridging the gap: Addressing the skills shortage threatening cloud security
Sponsor:
The concept of digital transformation has been with us for a decade now, and it has become the driving force behind the IT efforts of most enterprises and always involves multicloud deployments. In fact, 71% of respondents to a recent IBM survey agreed that it is “difficult to realize the full potential of a digital transformation” without a multicloud strategy. At the same time, 41% of the executives do not think their security initiatives have kept up with digital transformation.
One of the primary roadblocks to implementing a strong cloud security posture is the fact that each major public cloud platform uses a different approach and tools for protecting its infrastructure. For example, AWS, Azure and GCP do not handle basic security functions such as identity and access management (IAM), privileged access management and VPNs in the same way. There are nuances that must be considered for security measures to work properly. The professionals who understand these nuances are not easy to find. Is this where the talent crunch meets the budget crunch? There are few organizations that are not suffering from a lack of skilled security personnel, and the competition for talent is intense. Whilst corporations tighten their purse strings and talent is scarce how can cloud providers better collaborate with their customers during this challenging landscape?
Join this roundtable to discuss the following points
- How would you describe the current state of the skills shortage in cloud security? What are the specific challenges organizations face in finding and retaining skilled professionals?
- What are the key skills and expertise required to effectively manage cloud security? Are there any emerging areas or specialized roles that are becoming increasingly critical?
- What role can automation, artificial intelligence, and machine learning play in mitigating the skills shortage? How can these technologies enhance the capabilities of security teams and streamline cloud security operations?
- Looking to the future, what trends and technologies should organizations consider when developing their cloud security strategies? How can they prepare for the evolving threat landscape and the changing skill requirements?
- In the context of the skills shortage, how can organizations effectively balance outsourcing or partnering with third-party providers while maintaining control and ensuring the security of their cloud environments?
- Are there any regulatory or compliance considerations that must be considered when addressing the skills shortage in cloud security? How can organizations meet these requirements effectively?
- During a skills shortage shared responsibility has never been more prevalent, so how can cloud providers support businesses to navigate the complexities of cloud security, foster a proactive and cooperative approach to mitigate risks effectively?
11:25 - 11:30
Short Break
11:30 - 12:10
Masterclass Breakouts
Top recommendations from the State of Software Security 2023
What can developers and application security teams do to reduce the chances of introducing security flaws at all? This data driven session will take a vendor neutral approach to help you improve your program and examine the positive and negative influencing factors that go into an application lifecycle. This year our State of Software Security research wrapped up with some concrete recommendations based on our analysis and we will present the key data points behind them. That data will help you baseline your own program and take targeted steps we found are effective.
12:10 - 12:40
Headline Keynote
Enable resilient security posture with strategic security testing
Most security testing today is purely tactical. We find vulnerabilities and sometimes fix them. We use this process to satisfy compliance requirements and report a point-in-time status to regulators, but we rarely learn anything about our overall security posture and use that information to change our strategy and priorities. Strategic, transformational security testing is the solution to a more resilient posture in today's threat landscape.
Strategic security testing uses aggregated data from individual penetration tests to reveal the root cause of persistent weaknesses in security posture due to broken processes and overwhelmed staff. Security and IT management can use that data to invest in training and solutions that are specifically targeted at organizational deficiencies. Moreover, a strategic security testing program will track improvements in overall security posture over time so those improvements can be communicated to senior leadership and the board.
09:00 - 09:15
Opening Remarks
09:15 - 09:45
Keynote
Zero trust: From theory to reality
Companies are working tirelessly to embed risk mindsets and solutions throughout their technology and business practices. In this session, we’ll apply the academics and research behind a zero trust model to a corporate view of building end to end secure practices.
09:45 - 10:25
Panel Discussion
From vulnerability to empowerment: The human-centered approach to cybersecurity
88% of security breaches have human error at their core, according to research from Stanford University. The human being in the attack chain is seen as an easy, low-hanging no-hack option, to infiltrate a network and carry out a destructive and often financially lucrative cyber-attack.
Increasingly, cybercriminals are turning to the ‘human factor’ to execute their cyber-attack. Therefore, cybersecurity is much more than a technology problem. Attacks focus on finding ways to exploit human behavior to then begin a chain of events that results in stolen credentials and other data, ransomware infection, DDoS attacks, and general IT chaos.
The challenge is to ensure that anyone who interacts with the digital realm understands how cybersecurity works. The problem stems from the ‘plug-and-play’ view of technology, instilled in human behavior as digital technology has evolved over the decades. Cybersecurity behavior is then seen as a ‘blocker’, something that adds an extra burden on the human user. Enter Cyberpsychology! The basis of the discipline is to develop human-oriented systems for a given type of technological area. Cyberpsychology applies to home, work and work from anywhere environments.
So how can security leaders and their teams become empowered and achieve “the human-centered approach to cybersecurity?” A socio-technical approach is crucial. A technical only approach can achieve quite a lot but will not result in seamless cyber-security where humans are part of the systems.
Join this panel discussion to dive into the symbiosis between people and the technology that they use, and how organizations can reduce the number of human errors that lead to cyber-attack success.
10:25 - 10:35
Insight Break
10:40 - 11:30
Roundtables
Track 1: From threat to ally: The role of AI in revolutionizing cybersecurity
Sponsor:
Hackers are leveraging artificial intelligence and machine learning to add an additional layer of sophistication to their attacks, which means organizations need to move beyond the traditional and into the extraordinary when it comes to defending themselves. This includes investing in technologies such as threat detection and response, encryption, and multifactor authentication. But the question is "How can artificial intelligence help cybersecurity strategy today?” AI has the potential to revolutionize cybersecurity by augmenting human capabilities, enhancing threat detection, and enabling proactive defense mechanisms. However, caution is essential while AI is a powerful ally, it should be wielded responsibly and ethically. There is a strong need for ongoing research, collaboration, and human expertise to ensure that AI remains a force for good in the ongoing battle against cyber threats.
In this round table discussion, experts from the field of cybersecurity will come together to explore the transformative impact of AI on the evolving landscape of digital security. Delving into the pivotal role that AI plays in shifting the paradigm from perceiving AI as a threat to harnessing its potential as a powerful ally in safeguarding our digital world.
Track 2: Threat proofing tomorrow: Unleashing cyber resilience through continuous exposure management
Sponsor:
The modern attack surface is ever-expanding. Organizations are finding it increasingly difficult to keep up with the incredible scale of changes in their IT environment, while the expansion of cloud adoption has enabled businesses to move faster than ever before. However, this also implies that the attack surface is available to attackers and cybercriminals. For global organizations, there is a continuous risk of shadow IT introduction.
Discovering how to adapt to evolving business needs, complex technology landscapes and expanding attack surfaces is extremely important in the current scenario.
Track 3: Bridging the gap: Addressing the skills shortage threatening cloud security
Sponsor:
The concept of digital transformation has been with us for a decade now, and it has become the driving force behind the IT efforts of most enterprises and always involves multicloud deployments. In fact, 71% of respondents to a recent IBM survey agreed that it is “difficult to realize the full potential of a digital transformation” without a multicloud strategy. At the same time, 41% of the executives do not think their security initiatives have kept up with digital transformation.
One of the primary roadblocks to implementing a strong cloud security posture is the fact that each major public cloud platform uses a different approach and tools for protecting its infrastructure. For example, AWS, Azure and GCP do not handle basic security functions such as identity and access management (IAM), privileged access management and VPNs in the same way. There are nuances that must be considered for security measures to work properly. The professionals who understand these nuances are not easy to find. Is this where the talent crunch meets the budget crunch? There are few organizations that are not suffering from a lack of skilled security personnel, and the competition for talent is intense. Whilst corporations tighten their purse strings and talent is scarce how can cloud providers better collaborate with their customers during this challenging landscape?
Join this roundtable to discuss the following points
- How would you describe the current state of the skills shortage in cloud security? What are the specific challenges organizations face in finding and retaining skilled professionals?
- What are the key skills and expertise required to effectively manage cloud security? Are there any emerging areas or specialized roles that are becoming increasingly critical?
- What role can automation, artificial intelligence, and machine learning play in mitigating the skills shortage? How can these technologies enhance the capabilities of security teams and streamline cloud security operations?
- Looking to the future, what trends and technologies should organizations consider when developing their cloud security strategies? How can they prepare for the evolving threat landscape and the changing skill requirements?
- In the context of the skills shortage, how can organizations effectively balance outsourcing or partnering with third-party providers while maintaining control and ensuring the security of their cloud environments?
- Are there any regulatory or compliance considerations that must be considered when addressing the skills shortage in cloud security? How can organizations meet these requirements effectively?
- During a skills shortage shared responsibility has never been more prevalent, so how can cloud providers support businesses to navigate the complexities of cloud security, foster a proactive and cooperative approach to mitigate risks effectively?
11:30 - 12:00
Innovation Exchange Keynote
Digital sovereignty: From more cloud to better cloud
Improved security for business resilience: this GDS Summit puts lights on today’s key challenge for many organisations from the public and private sectors: how to combine benefits from innovation brought by the cloud, and remain accountable towards customers, regulations, end users.
In this session we will explore the concept of digital sovereignty and define actionable strategies to improve protection and resilience in multi-clouds
12:00 - 12:30
Closing Keynote
Sometimes changing one thing changes everything
For decades, the state of cybersecurity has focused on an unwinnable arms race, with each new season rolling out the next 'magic bullet' requiring an expenditure of time, money, and ongoing labor by increasingly taxed teams. The pace of device proliferation, trained labor pool size, and regulatory considerations continues to make cybersecurity a next to impossible battle to win. Simply trying a new tool won't catch teams back up - it's time for an entirely new way to envision the way that we support our people, business, and mission in a way that's both enabling and private. The rise of the Enterprise Browser doesn't simply give highly regulated worldwide organizations a new cybersecurity tool. It reimagines the way that people work. It reimagines how leading edge technologies like OpenAI can be harnessed to help the organization rather than be the next in a line of technologies we say 'no' to. It eliminates the need for wide swaths of expensive tools people hate to use and administer. Sometimes changing one thing changes everything.
09:00 - 09:15
Opening Remarks
09:15 - 09:45
Keynote
Charting a secure course: Confronting risks in the world of digital transformation, Cloud, and AI
In an era of unprecedented technological change, organizations are racing to embrace Digital Transformation, Cloud Computing, and Artificial Intelligence to remain competitive and relevant. However, with innovation comes risk, and navigating this digital frontier requires a strategic approach to security and resilience. During this interactive keynote Omar Khawaja, former CISO, Highmark Health will walk us through how best to navigate risks amid the ever-changing digital frontier. Audience members will have the opportunity to get involved and drive subtopics to this brilliant session.
09:45 - 10:25
Panel Discussion
The future of cybersecurity amid digital transformation
In the quest for successful digital transformation, it is crucial to establish a strong cybersecurity foundation. CIOs and CTOs often leverage cutting-edge technologies such as artificial intelligence (AI) and Internet of Things (IoT) to empower their business solutions. However, these tools bring forth new or heightened cybersecurity and technology risks.
Neglecting cybersecurity in the pursuit of digitalization leaves organizations, employees, and customers vulnerable. Without adequate cybersecurity measures, digital transformation becomes a recipe for disaster. Hence, security leaders must navigate the path forward by determining the most effective approach.
This panel aims to explore the integration of cybersecurity with end-to-end visibility in the context of digital transformation. By addressing the essential need for reliable and resilient cybersecurity, the discussion will delve into strategies for safeguarding organizations, employees, and customers. Participants will gain insights into decision-making processes that prioritize cybersecurity while enabling successful digital transformation initiatives.
10:25 - 10:35
Insight Break
10:35 - 11:35
Roundtable Leaders Panel
11:35 - 12:05
Innovation Exchange Keynote
Shaping the future of cyber defence: Generative AI in security operations
AI models like OpenAI ChatGPT has sparked a wave of initiatives spanning multiple industries, all eager to unearth fresh applications and exploit the potential of this technology. The realm of cybersecurity is no exception, with technology providers already rolling out innovative products and features that harness the power of Large Language Models (LLMs).
12:05 - 12:35
Closing Keynote
The ever-evolving responsibilities for today’s CISO
Security professionals have never had a higher profile, cyber security is top of every board’s agenda, along with pressure to perform, expectations to deliver, relentless attacks and worries about personal liability. What does the landscape for today’s CISO and their teams look like today? Joe Sullivan, former CSO at Facebook (now Meta), Uber, and Cloudflare, and current CEO of UkraineFriends.org will share his journey in navigating uncertain times. How can CISO’s and their teams be prepared for the unexpected? Lessons learned, trust and support will be a key feature of the interview.
Why Attend
New connections
Build new connections with likeminded senior leaders
Business trends
Stay current with emerging business trends
Key takeaways
Downloadable and actionable takeaways
New partnerships
Accelerate key projects through meaningful new partnerships
Insights
De-risk new projects by gaining a broad range of insights
New technologies
Understand the impact new technology can make
An immersive
Digital Summit
interactive features including:
Audience Interaction
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
Interactive Live Polling
Keep engaged through interactive live polling and gamification tools.
Direct connections
Ask your questions face-to-face with the speakers via our leading stage technology.
Relationship building
Build stronger connections with leading executives that you will take with you through your career
Thought Leadership
Content and insight from industry experts when it matters most
Intelligent interaction
Interactive quizzes gamify your experience
Apply to attend
Meet with fellow industry leaders and solve today’s greatest business challenges.
Thank you for your interest. One of the team will be in touch soon.
Frequently asked questions
A Digital Summit from GDS Group is a 3-day event experience bringing multiple partners and senior decision makers together. Within this immersive enviroment they discover new technical solutions, share learning opportunities and discuss trending industry topics which boosts insight, conversation and connections.
There are a couple of ways you can participate in a GDS event experience; as a partner or as an attendee. Whichever you are interested in, do get in touch.
Global senior decision makers from leading industry brands attend our event experiences. Between 2020 to May 2023, 34,473 senior executives attended our event experiences. If you are interested in attending a GDS event experience, please check out our upcoming events.
At one of our GDS Digital Summits there are several speaking slot packages available for you – 2x power insights commentator slots, keynote panel seats, masterclass hosting, prime keynote slot, and headline keynote slot.
Get in touch with us to learn more.
Yes! We partner with leading brands all across the globe – for partnership opportunities please get in touch.