On 2-4 December 2019, the US edition of our Security Insight Summit will bring together senior decision-makers and business leaders from across North America to discuss current industry challenges and opportunities, how to get the most out of them – and where the emerging threats lie.

Key themes under discussion include: how to get ahead of the security curve with cyber intelligence; the importance of stemming breaches and bolstering defences; and why, with the health of IT infrastructures now business critical, security is now an organisational issue rather than merely an IT one.

From case studies that lift the lid on operations inside best-in-class organisations, to workshops and collaborative sessions that focus on real challenges and future technology innovations, to one-to-one meetings with industry peers offering practical advice tailored to your specific needs, the summit provides you with everything you need to implement your key projects more effectively.

Our Approach

Every GDS Summit has one stated aim: to help attending executives implement their key projects more effectively. We do this by developing an in-depth understanding of those executives' project needs, the business outcomes they want to achieve, and the challenges they face in terms of hitting those goals.

Who Attends

Our summits are designed for executives looking to take their business to the next level – from market-leading brands to disruptive new entrants. As such, we’ve worked with some of the world’s best-loved and most forward-thinking businesses.
Apply to attend

Past Attendees

At previous events we've helped executives from some the world's most significant firms - as well as the most forward-thinking - to address their project challenges.
Image of Andy Kim
Logo of Allstate
Andy Kim
CISO eBusiness
Allstate
Image of Jonathan Fowler
Logo of Consilio
Jonathan Fowler
CISO
Consilio
Image of Kausar Kenning
Logo of Suntrust
Kausar Kenning
Head, Cyber Security Insights
Suntrust
Image of Michael Woods
Michael Woods
Director Cyber Security Global Operations
GE
Image of Nasser Fattah
Logo of MUFG Union Bank
Nasser Fattah
MD Technology
MUFG Union Bank
Image of Parveen Malik
Logo of State Street
Parveen Malik
AVP InfoSec Impl
State Street
Image of Rodney Strader
Logo of Discovery Communications
Rodney Strader
VP Security Operations
Discovery Communications
Image of Lee Carsten
Logo of Aon
Lee Carsten
VP Cyber Solutions
Aon
Image of Allan Alford
Logo of Mitel
Allan Alford
CISO
Mitel
Image of Bradley J. Schaufenbuel
Logo of Paylocity Holding Corporation
Bradley J. Schaufenbuel
CISO
Paylocity Holding Corporation
Image of Scott Mathis
Logo of RBC Bank US
Scott Mathis
CISO
RBC Bank US
Image of Ed Brindley
Logo of Department of Defense
Ed Brindley
CISO
Department of Defense

6 Challenges in Security

Our summit is focused on solving your strategic challenges
  • Review established and upcoming compliance regulations that undermine business strategies.
  • Continuously assessing the threat environment to brace your organization from new attacks.
  • Ensuring cyber hygiene with the education of all necessary end-users.
  • Establishing early interest in information security careers to improve the security workforce gap.
  • Reassessing vendor management to reduce unmanaged risk.
  • Recognising the rise of IoT-driven financial crime.
Apply to attend

Summit Schedule

Day 1
Day 2
Day 3
Monday December 2, 2019
Registration
1:00pm - 6:00pm

Grab your name badge, say hello, activate the onsite app and prepare to leave the office behind for two-and-a-half days of networking, learning and intelligence gathering.

Solution provider briefing
2:00pm - 2:30pm

Details To Follow.

Welcome remarks and delegate briefing
2:30pm - 2:45pm

What? When? How? Where? Join our Master of Ceremonies for a brief welcome and orientation session, where we’ll explain your itinerary for the next few days.

Panel Discussion
2:45pm - 3:30pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
How Digital Transformation Has Changed Security Needs

The business world has transformed with the ever-growing expansion of technology. With companies adopting IoT devices, and moving more of their data into the cloud, this advancement has created a growing concern for firms and their security operations. The expansion of digital presences relates the large effects of digital transformation on an organization, and how CISOs are changing security needs.

  • Higher potential for damage
  • Uncontained networks
  • Increase of sophisticated attacks
  • Cyber security solutions for the digital transformation
Interview
3:30pm - 3:50pm
A one on one interview diving into the details of how to prepare yourself for the realities of one of the industry's top challengers.
"Hi, How Can I Help?" - Secret Recordings From Device Assistants

Google and Amazon have come under fire after recent discoveries of products such as Amazon Echo and Google Home that are recording conversations without the necessary wake up message. This brings into question the safety of consumer data, and whether these activities are necessarily compliant.

Roundtable Track 1
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Rethinking Risk Assessments

Security risk assessments are developing to the point where traditional approaches are no longer appropriate to today’s digital world.

  • How can we update our risk assessments to keep up with digital transformation?
  • How have the controls evolved?
  • Should we consider business risk and security risk as the same?
  • We put a lot of focus on threats. Are we appropriately assessing for vulnerability?
Roundtable Track 2
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Raising End-User Security Awareness

47% of business leaders said that human error such as accidental loss of a device or document by an employee had cause a data breach at their organization. With such a large percentage of data breaches being cause by employee negligence, what do security leaders need to be changing in their security education efforts?

  • Evaluating the most common ways that users can harm your network.
  • With the increase in employees wanting to work remotely, how can we update cybersecurity practices to lower the chance of a data breach?
  • Expecting an employee to retain information from a training once a year is unrealistic. How often should we be teaching good cyber practice to our employees, and what are the effective methods of delivering these programmes?
Roundtable Track 3
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Controlling Privacy with Third-Party Providers
headshot of Campbell Tucker
Campbell Tucker
Chief Privacy Officer - Novant Health

Outsourcing to a third party can dramatically increase the risk of a privacy breach. 44% of organizations have experienced a significant breach at the hand of vendors.

  • Identifying ways to select and control solution providers.
  • What are the best practices when procuring a vendor?
  • How can you control and nurture the collaboration?
  • How is the introduction of CCPA going to affect third party vendor relationships?
  • How do you help third parties, especially smaller companies, become more secure?
Roundtable Track 4
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Concerns Surrounding Security and IoT Today

Internet of Things (IoT) security and privacy has proven to be one of the modern-day challenges for infosec officers. We discuss the three biggest challenges that IoT Devices bring to an organization.

  • IoT devices are notorious for their vulnerability to hacking. What solutions can manufacturers use to ensure IoT security?
  • With company systems receiving data from IoT devices every day, how can a company ensure the data has not be compromised? How can we move forward and ensure devices’ perimeter protection?
  • How can we protect the big data collected from IoT devices?
  • How do we address these privacy and security concerns?
Roundtable Track 5
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Applying A Management Framework to A Holistic Security Approach
headshot of Wayne Towson
Wayne Towson
Senior Director, Global Security - Abbott

The convergence of physical and cyber security. A cyber attack can now have dramatic affects to physical security. Applying a structure to a holistic cyber security approach needs to be the way forward.

  • What is holistic security?
  • How do we begin with applying a management framework?
  • What elements and factors do we need to consider will be most affected?
  • How can this be taken back to our organization and used effectively?
Roundtable Track 6
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
The Future Is In Cloud
headshot of Marco Mirko Morana
Marco Mirko Morana
SVP Application Security & Innovation - Citi

Cloud has become more popular, with most organizations expected to have migrated by 2020. The move is more attractive and convincing that “non-cloud” companies, as this technology offers more effective and flexible solutions. The impact of the cloud on the world will be shown over the next few years.

  • 50% of IT professionals believe that AI and ML will play a major role in cloud computer adoption, increasing migration figures to 67% by 2020. What affect will cloud computer have on AI and ML?
  • What are the biggest mistakes companies are making when moving to the cloud?
  • Is cloud computing the future for everyone, or should some businesses be better using on-premise systems?
  • Should companies hire cloud consulting agencies to assist the transition and address growing cloud expenditure?
Roundtable feedback
5:00pm - 5:30pm

Details To Follow.

Networking drinks
6:00pm - 7:00pm

Time to kick off your heels, loosen those ties and get to know your fellow summit attendees. Relax, drinks are on us.

Gala dinner
7:00pm - 10:00pm

Time for some fun; you’ve earned it. Join us for our night’s dinner and entertainment. Details to follow.

Keynote
8:00pm - 8:30pm
Our Keynote speaker will be addressing the entirety of Summit attendees during our Gala Dinner. They will be going beyond the 'brand story' and sharing their experience and the real truths of tackling a challenge that is shaping the industry.
Gala dinner keynote, Q&A: Catch Me If You Can

Keynote to be presented by Frank Abagnale, the security consultant known by his former con man background, famously portrayed in the Steven Spielberg movie “Catch Me If You Can”.

Tuesday December 3, 2019
Breakfast
7:00am - 7:50am

The most important meal of the day. Get yourself set for a productive day by joining us for coffee, croissants and more.

Welcome Remarks
7:50am - 8:00am

Details To Follow.

Panel Discussion
8:00am - 8:20am
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
A Game of Trust: IoT

IoT delivers significant benefits to our society and economy, and to achieve this, IoT leverages large volumes of detailed and often, real time data. However, it’s easy to lose trust in IoT with the dear of data being shared or access by malicious attacks. This session looks at the pro-active way of providing secure, enhance data security and identify best practice in data management.

  • Data transparency in line with compliance.
  • Data exchange and portability.
  • Protection against cyber-attacks.
Keynote
8:20am - 8:50am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Title TBC

Details To Follow.

Keynote
8:50am - 9:20am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
The Impact of Legacy On Disaster Recovery

Cyber weaponization has been a major gamechanger in the era of digital transformation. Cyber disasters cripple business operations and significantly impact the shareholder value. From targeted attacks to collateral damage from a nation-state conflict, cyber risk directly correlates with business risk. But many organizations have not updated their recovery playbook to combat these emerging threats. Legacy recovery systems cost organizations millions in unnecessary downtime and unplanned infrastructure costs because of a fundamental issue: cybersecurity is not top of in mind.

Oxford Style Debate and Live Polling
9:20am - 10:00am
One Topic. Two experts. Two opinions. You'll get the chance to vote on where you stand before the session starts. We'll then hear from our two experts, to see if they can sway your opinion when you participate in the closing vote.
"A CRO Isn't a Necessary Addition to the C-Suite"

More C-Suite titles are being added every year, and many question whether a Chief Risk Officer is a necessary contribution. Should organizations make do with a risk committee?

  • The Chief Risk Officer reports to the CEO or CFO. Shouldn’t they be on the same level?
  • A Risk Committee provides a wider variety of expertise and knowledge on risk management and strategy.
  • Does the Chief Risk Officer affect the CISOs role at the corporate strategy table?
  • With digital transformation changing all functions of an organization, is one person strategizing risk management for an organization potentially exposing?
Coffee & Networking Break
10:00am - 10:20am

Take advantage of time to network with fellow summit attendees and further discuss your business transformation projects.

Case Study
10:20am - 11:00am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Security Concerns in Mergers and Acquisitions

During M&A, companies will straight away look at business functions like finance and operations. But, what about security? Poor cyber hygiene can cost a company millions of dollars, and M&A puts company in a vulnerable position to potential cyber-attacks. More than a third of acquiring companies discover security problems, or even breaches, during the post-acquisition integration.

Workshop
11:00am - 11:40am
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Bringing it to the Board

With the threats of hackers infiltrating your organizations information. With today’s world risk, security affecting revenue streams and the nightmare of public data breaches, how do we ensure CISOs are given the right seat at the table to discuss the big issues?

  • What are the first steps a CISO can take to effectively communicate to the Board?
  • How can understanding the responsibilities of the Board and the CISO be used to bridge that communication?
  • What are the effective strategies and processes CISOs can use for reporting information to the board?
  • How can CISOs show threats and attack vectors specifically affecting our revenue streams?
  • What initiatives can CISOs place and promote to assist revenue streams?
Panel Discussion
11:45am - 12:25pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
A Person-Centric Approach to Third Party Risk Management
headshot of Gregory Wilson
Gregory Wilson
CISO - Pioneer Natural Resources

Today, companies are able to outsource operations to solution providers. Whilst promoting efficiency in space and expertise, the increased danger of cybercrime is on every CISOs mind.

  • When conducting a risk assessment, should we use another SaaS, or if this defeating the purpose?
  • Bringing it back home, how can we use people to work more efficiently and bring trust back with our vendors?
Keynote
12:30pm - 1:00pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Title TBC

Details To Follow.

Networking Lunch
1:00pm - 1:45pm

Worked up an appetite? Recharge those batteries with our buffet-style lunch, and prepare to meet the afternoon head-on.

Roundtable
Session 2 - Discovery
1:45pm - 2:30pm
Learning and sharing with your group. What are the solutions? Are they readily available? What path are you going to take?
Drill Down Roundtables

1. Rethinking Risk Assessments

2. Raising End-User Security Awareness

3. Controlling Privacy with Third-Party Providers

4. Concerns Surrounding Security and IoT Today

5. The Future Is In Cloud

Workshop
2:35pm - 3:15pm
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Incident Response for Phishing Attacks

A tale as old as the first computer, phishing continues to be a significant issue for both consumers and organizations. Phishing and social engineering are how most organizations are implicated. This session will cover:

  • Planning, response and recovery from a phishing attack.
  • Examples of breaches and the organizations following actions.
  • Future incident response plans customers have implemented.
Case Study
3:20pm - 4:00pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Breaching Sensitive Data by Third-Party Management

Details To Follow.

Panel Discussion
4:05pm - 4:45pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Surging Young Talent into Security Careers
headshot of Rick Doten
Rick Doten
VP Information Security - Centene
headshot of Daniel Sergile
Daniel Sergile
Deputy CISO - Ciox Healthcare

The talent gap in cybersecurity has been reported as an industry crisis. Recent estimates should as many as 3.5 million unfilled positions in the industry by 2021. With hackers increasing the number of attacks and taking advantage of the lack of security officials in organizations, security executives are questioning how to push more people into a security career path.

  • Do applicants require previous education, such as degrees, in background subjects around computer science and information technology? Can on-the-job training be enough for entry-level positions?
  • The Center for Cyber Safety and Education estimates that only 14% of the security workforce is made up on women. How can we encourage more women to consider a career in cyber security?
  • What emerging roles can we expect to appear in the next 2 years?
  • What opportunities can we offer our current employees to develop their skills and further their career progression?
  • Should the industry put pressure on the government agencies to take more initiative on this?
Oxford Style Debate and Live Polling
4:45pm - 5:40pm
One Topic. Two experts. Two opinions. You'll get the chance to vote on where you stand before the session starts. We'll then hear from our two experts, to see if they can sway your opinion when you participate in the closing vote.
"Information Security Teams Should Access All User Activities for Security Breach Re-Offenders"
Cyber Hygiene
headshot of Wes Knight
Wes Knight
CISO - Georgia Department of Revenue

What takes precedent? Cyber hygiene or user privacy?

Statements for Discussion:

  • We cannot educate re-offenders without understanding their computer habits.
  • As part of joining the company, the individuals should agree to have their information collected if the continually succumb to cyber-attacks.
  • When their online habits are affecting the security of the organization and information it holds, they lose their right to privacy
  • This isn’t about penalising or singling out the individual, the company information is the priority.
Keynote
5:40pm - 6:10pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Closing Keynote

Details To Follow.

Attendee downtime
6:10pm - 7:00pm

Time for a well-deserved break in your busy schedules.

Networking drinks
7:00pm - 7:30pm

Time to kick off your heels, loosen those ties and get to know your fellow summit attendees. Relax, drinks are on us.

Gala dinner, silent auction, quiz/trivia
7:30pm - 10:00pm

Time for some fun; you’ve earned it. Join us for our second night’s dinner and entertainment. Details to follow.

Wednesday December 4, 2019
Breakfast
7:30 am - 8:20 am

The most important meal of the day. Get yourself set for a productive day by joining us for coffee, croissants and more.

Welcome Remarks
8:20 am - 8:30 am

Details To Follow.

Keynote
8:30 am - 8:50 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Low Hanging Fruit: Local and State Government in Ransomware Attacks

The recent influx of city ransomware pay-outs sends a strong message that public state institutions are unprepared to defend themselves from cybercrime, and attackers are taking notice. Cyber criminals are cheering to a new and reliable source of easy revenue: targeting unsuspecting state and local governments with ransomware. The ransom price tag is strategically weighed to be the most affordable option for victims based on their specific circumstances.

In most cases, the alternative to paying the ransom is to rebuild the entire network from scratch which costs weeks of downtime and risks permanent loss of sensitive data. But the true price concerns public safety. Since when is it ok to negotiate with terrorists? City governments could be funding the next global cyber assault.

  • Fortune 500 enterprise cyber programs struggle with ransomware. How can local and state governments stand a chance with such limited resources and support?
  • Since 2015, ransomware has evolved into a billion-dollar business. Considering recent events, cyber criminals have no incentive to stop this new stream of revenue. What is the moral decision to make when public safety is at stake?
  • To avoid further ransom pay-outs, recovery strategies must be efficient and affordable. How can automation help organizations combat these emerging threats?
Keynote
8:50 am - 9:20 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Title TBC

Details To Follow.

Roundtable
Session 3 - Outcomes
9:20 am - 10:00 am
What does it all mean. Tracing back through two days of work, where are we? What you are bringing back to the office with you.
Drill Down Roundtables

1. Rethinking Risk Assessments

2. Raising End-User Security Awareness

3. Controlling Privacy with Third-Party Providers

4. Concerns Surrounding Security and IoT Today

5. The Future Is In Cloud

Coffee & Networking Break
10:00 am - 10:30 am

Take advantage of time to network with fellow summit attendees and further discuss your business transformation projects.

Case Study
10:30 am - 11:10 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Title TBC

Details To Follow.

Workshop
11:10 am - 11:50 am
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Quantum Technology: The New AI

One of the major scientific discoveries in the 20th century was the development of quantum theory. In recent years, the progression into controlling quantum systems and further progression into application is at our fingertips. The race to the first viaable quantum computer has had many question it’s consequential effects in cybersecurity. Today’s security, that holds together our digital economy, will fall and orgnizations with be exposed to millions in transformation costs. This session will cover the current concerns around Quantum Computing:

  • When could we potentially see some of the first applications of quantum computing?
  • What are the estimate costs companies could face from lack of preparation?
  • How quickly could potential threats adopt quantum technology?
Panel Discussion
11:50 am - 12:30 pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Closing panel & wrap up

We speak with the roundtable moderators to discuss our findings and takeaways on the 6 topics discussed over the last 3 days.

Buffet lunch
12:30 pm - 1:30 pm

Worked up an appetite? Recharge those batteries with our buffet-style lunch for your journey home.

Summit Location

Ritz Carlton, Lake Oconee, Georgia

Our events take place at some of the most prestigious venues in the world. Five-star accommodation, dining and amenities make attending one of our summits both business and pleasure. Being productive has never been so much fun.

Popular content from our Summits

GDS Summits host experts to help experts. Our speakers are leading executives willing to share their insight to change the industry and the world in critical ways.

To discuss how GDS Summits can help you solve your project challenges contact us on: 0117 921 4000 or email sayhello@gdsgroup.com.

Join us at the Upcoming Event

Don't miss out

Apply now