On 2-4 December 2019, the US edition of our Security Insight Summit will bring together senior decision-makers and business leaders from across North America to discuss current industry challenges and opportunities, how to get the most out of them – and where the emerging threats lie.

Key themes under discussion include: how to get ahead of the security curve with cyber intelligence; the importance of stemming breaches and bolstering defences; and why, with the health of IT infrastructures now business critical, security is now an organisational issue rather than merely an IT one.

From case studies that lift the lid on operations inside best-in-class organisations, to workshops and collaborative sessions that focus on real challenges and future technology innovations, to one-to-one meetings with industry peers offering practical advice tailored to your specific needs, the summit provides you with everything you need to implement your key projects more effectively.

Our Approach

Every GDS Summit has one stated aim: to help attending executives implement their key projects more effectively. We do this by developing an in-depth understanding of those executives' project needs, the business outcomes they want to achieve, and the challenges they face in terms of hitting those goals.

Who Attends

Our summits are designed for executives looking to take their business to the next level – from market-leading brands to disruptive new entrants. As such, we’ve worked with some of the world’s best-loved and most forward-thinking businesses.
Apply to attend

Attendees Include

The upcoming summit will welcome executives from some of the world's biggest and most recognisable firms - as well as the most forward-thinking - as they look to address their project challenges.
Image of Campbell Tucker
Logo of Novant Health
Campbell Tucker
Chief Privacy Officer
Novant Health
Image of Marco Mirko Morana
Logo of Citi
Marco Mirko Morana
SVP Application Security & Innovation
Citi
Image of Raymond Lipps
Logo of Celgene
Raymond Lipps
CISO
Celgene
Image of Nimesh Mehta
Logo of National Life Group
Nimesh Mehta
CIO
National Life Group
Image of Heidi Salow
Logo of Leidos
Heidi Salow
CPO
Leidos
Image of Carsten Krause
Logo of ModusLink
Carsten Krause
CIO, CISO & SVP IT Ops
ModusLink
Image of Michael Marsilio
Logo of Paradies Lagardere
Michael Marsilio
CISO
Paradies Lagardere
Image of Chris White
Logo of IPG Group
Chris White
Deputy Chief Information Security Officer
IPG Group
Image of Tamika Bass
Logo of Georgia Department of Public Health
Tamika Bass
CISO
Georgia Department of Public Health
Image of Randy Raw
Logo of Veterans United Home Loans
Randy Raw
CISO
Veterans United Home Loans
Image of David Whipple
Logo of Apple Leisure Group
David Whipple
CISO
Apple Leisure Group
Image of Andrew Bjerken
Logo of Catalina
Andrew Bjerken
Global CISO & CPO
Catalina

6 Challenges in Security

Our summit is focused on solving your strategic challenges
  • Don't Avert Your Eyes: Continuously Assessing the Threat Environment Against Emerging Technologies
  • Cyber-Hygiene: Educating the Workforce and Creating Impact in Professional and Personal Environments
  • Third-Party Providers: Building Effective Relationships to Reduce Unmanaged Risk
  • Achieving Equilibrium: Balancing Security and Compliance to Protect Infrastructure
  • An Unstoppable Force: Merging Physical and Cyber Security for Total Organizational Strength
  • Accomplishing Successful Digital Transformation: Effective Use of AI, IoT and Cloud
Apply to attend

Summit Schedule

Day 1
Day 2
Day 3
Monday December 2, 2019
Registration
1:00pm - 6:00pm

Grab your name badge, say hello, activate the onsite app and prepare to leave the office behind for two-and-a-half days of networking, learning and intelligence gathering.

Solution provider briefing
2:00pm - 2:30pm

Details To Follow.

Welcome remarks and delegate briefing
2:30pm - 2:45pm

What? When? How? Where? Join our Master of Ceremonies for a brief welcome and orientation session, where we’ll explain your itinerary for the next few days.

Panel Discussion
2:45pm - 3:30pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
How Digital Transformation Has Changed Security Needs
headshot of Wayne Towson
Wayne Towson
Senior Director, Global Security - Abbott
headshot of Marco Mirko Morana
Marco Mirko Morana
SVP Application Security & Innovation - Citi
headshot of Dan Dubowski
Dan Dubowski
VP, BISO USIS - Equifax

The business world has transformed with the ever-growing expansion of technology. Companies are adopting IoT devices and moving more of their data to the cloud. However, this advancement is creating concern for firms and their security operations. The growing digital presence relates to the huge effects of digital transformation on organizations and how CISOs are changing security needs. This panel will focus on the higher potential for damage, uncontained networks, increasingly sophisticated attacks and cyber security solutions in the face of digital transformation.

Interview
3:30pm - 3:50pm
A one on one interview diving into the details of how to prepare yourself for the realities of one of the industry's top challengers.
Bring It Back To Basics
headshot of Michael Marsilio
Michael Marsilio
CISO - Paradies Lagardere

It’s easy to get caught up in buzzwords and become enamored by the newest piece of technology in an attempt to try and enhance your security processes, but are you focusing on the basics and setting a strong foundation? What is your full view of your security organization?

Roundtable Track 1
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Don’t Avert Your Eyes: Continuously Assessing the Threat Environment Against Emerging Technologies
headshot of Greg Bell
Greg Bell
VP, MSS Threat Prevention - Trustwave

Security risk assessments are developing to the point where traditional approaches are no longer appropriate for today’s digital world.

  • How can we update our security risk assessments to keep up with emerging technologies and digital transformation in general?
  • Should we consider security risk and business risk as the same?
  • We put a lot of focus on threats but are we appropriately assessing for vulnerability?
Roundtable Track 2
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Cyber-Hygiene: Educating the Workforce and Creating Impact in Professional and Personal Environments
headshot of Lee Bailey
Lee Bailey
CISO - ABC Fine Wine & Spirits

47% of business leaders say human error such as accidental loss of a device or document by an employee has caused a data breach at their organization. With such a large percentage of data breaches caused by employee negligence, what do security leaders need to do to educate their workforce?

  • Evaluating common ways users can harm your network.
  • With the increase in employees wanting to work remotely, how can we update cybersecurity practices to lower the chance of a data breach?
  • How often should we be teaching cyber practice to employees, and what methods work?
Roundtable Track 3
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Third-Party Providers: Building Effective Relationships to Reduce Unmanaged Risk
headshot of Campbell Tucker
Campbell Tucker
Chief Privacy Officer - Novant Health

Outsourcing to a third party can dramatically increase the risk of a privacy breach. 44% of organizations have experienced a significant breach at the hand of vendors.

  • Identifying ways to select and control solution providers.
  • What are the best practices when procuring a vendor?
  • How can you control and nurture the collaboration?
  • How is the introduction of CCPA going to affect third party vendor relationships?
  • How do you help third parties, especially smaller companies, become more secure?
Roundtable Track 4
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Achieving Equilibrium: Balancing Security and Compliance to Protect Infrastructure
headshot of Tom Buxton
Tom Buxton
Head of Technical Solutions, Eastern U.S. - Blackberry
headshot of Derek Brink
Derek Brink
VP and Research Fellow - Aberdeen Group

GDPR, HIPAA and the imminently approaching CCPA. Is your organization effectively meeting the mark on all regulations? How do we keep up with the changing requirements from state, federal and international regulations? These are major concerns for security and privacy officials. What are the main challenges and how do we overcome them?

Roundtable Track 5
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
An Unstoppable Force: Merging Physical and Cyber Security for Total Organizational Strength
headshot of Wayne Towson
Wayne Towson
Senior Director, Global Security - Abbott

The convergence of physical and cyber security. A cyber attack can now have dramatic effects to physical security. Applying a structure to a holistic cyber security approach needs to be the way forward.

  • What is holistic security?
  • How do we begin applying a management framework?
  • What elements and factors do we need to consider will be most affected?
  • How can this be taken back to our organization and used effectively?
Roundtable Track 6
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Accomplishing Successful Digital Transformation: Effective Use of AI, IoT and Cloud
headshot of Marco Mirko Morana
Marco Mirko Morana
SVP Application Security & Innovation - Citi

Cloud has become more popular. Most organizations are expected to migrate by 2020. The move is even attracting “non-cloud” companies because the technology offers more effective and flexible solutions. But what about the other technologies that are helping organizations excel in digital transformation? Are you harnessing them successfully?

  • Many IT professionals believe that AI and ML will play a major role in the adoption of cloud computing. 67% of professionals are expected to migrate by 2020. What effect will cloud computing have on AI and ML?
  • What are the biggest mistakes companies are making when moving to the cloud?
  • Is cloud computing the future for everyone, or should some businesses be using on-premise systems?
  • Should companies hire cloud consulting agencies to assist in the transition and address growing cloud costs?
Networking drinks
5:00pm - 7:00pm

Time to kick off your heels, loosen those ties and get to know your fellow summit attendees. Relax, drinks are on us.

Gala dinner
7:00pm - 10:00pm

Time for some fun; you’ve earned it. Join us for our night’s dinner and entertainment. Details to follow.

Keynote
8:00pm - 8:30pm
Our Keynote speaker will be addressing the entirety of Summit attendees during our Gala Dinner. They will be going beyond the 'brand story' and sharing their experience and the real truths of tackling a challenge that is shaping the industry.
Gala dinner keynote, Q&A: Catch Me If You Can
headshot of Frank Abagnale
Frank Abagnale
President - Abagnale & Associates

Keynote to be presented by Frank Abagnale, the security consultant known by his former con man background, famously portrayed in the Steven Spielberg movie “Catch Me If You Can”.

Tuesday December 3, 2019
Breakfast
7:00am - 7:50am

The most important meal of the day. Get yourself set for a productive day by joining us for coffee, croissants and more.

Welcome Remarks
7:50am - 8:00am

Details To Follow.

Panel Discussion
8:00am - 8:30am
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Steps to Achieving Effective Cyber Hygiene in Your Organization
headshot of Tamika Bass
Tamika Bass
CISO - Georgia Department of Public Health

Cyber Hygiene is a big buzzword within the security space, but outside the security team, is the rest of your organization keeping clean? Good security practice doesn’t just stop at the office, and we need to ensure that our workers are taking safe security measures at home too. What steps can you take to achieve effective cyber hygiene in your organization?

Keynote
8:30am - 9:00am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Cyber Insecurity: Can We Change the “Game"?
headshot of Cameron Haight
Cameron Haight
VP & CTO - VMWare

Cybersecurity. Perhaps we should actually call it cyber insecurity because that’s the situation that most enterprises find themselves in today. What we’ve already found out is that given the breadth of the cyber threat there is no one technology that will keep an enterprise safe. Thus, we have to look at the threat from another lens that might help us to assess how to deal with the increasing risk.

Keynote
9:00am - 9:20am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
An Act of God: Legacy and Disaster Recovery
headshot of Raymond Lipps
Raymond Lipps
CISO - Celgene

Cyber weaponization has been a major gamechanger in the era of digital transformation. Cyber disasters cripple business operations and significantly impact the shareholder value. From targeted attacks to collateral damage from a nation-state conflict, cyber risk directly correlates with business risk. But many organizations have not updated their recovery playbook to combat these emerging threats. Legacy recovery systems cost organizations millions in unnecessary downtime and unplanned infrastructure costs because of a fundamental issue: cybersecurity is not at the forefront of business leaders’ minds.

Oxford Style Debate and Live Polling
9:20am - 10:00am
One Topic. Two experts. Two opinions. You'll get the chance to vote on where you stand before the session starts. We'll then hear from our two experts, to see if they can sway your opinion when you participate in the closing vote.
"Security Teams Should Have Access to All User Activities for Security Breach Re-Offenders"
headshot of Wes Knight
Wes Knight
CISO - Georgia Department of Revenue
headshot of Derek Brink
Derek Brink
VP and Research Fellow - Aberdeen Group

For: Cyber hygiene is more important than user privacy.

Against: User privacy should take precedent.

Coffee & Networking Break
10:00am - 10:15am

Take advantage of time to network with fellow summit attendees and further discuss your business transformation projects.

Case Study
10:15am - 10:55am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Firewalls: Getting the Fundamentals Right
headshot of Ben Grier
Ben Grier
Senior Manager, Security Architecture - NCR Corporation
headshot of Stan Lowe
Stan Lowe
Chief Security Officer - Zscaler

Details to follow.

Workshop
11:00am - 11:40am
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Bringing it to the Board
headshot of Derek Brink
Derek Brink
VP and Research Fellow - Aberdeen Group

With today’s world of risk, security affecting revenue streams and the nightmare of public data breaches, how do we ensure CISOs are given the right seat at the table to discuss the big issues?

  • What are the first steps a CISO can take to effectively communicate to the Board?
  • How can understanding the responsibilities of the Board and the CISO be used to bridge that communication?
  • What are the effective strategies and processes CISOs can use for reporting information to the board?
  • How can CISOs show threats and attack vectors specifically affecting our revenue streams?
  • What initiatives can CISOs place and promote to assist revenue streams?
Panel Discussion
11:45am - 12:25pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
A Person-Centric Approach to Third Party Risk Management
headshot of Gregory Wilson
Gregory Wilson
CISO - Pioneer Natural Resources

Today, companies are able to outsource operations to solution providers. Whilst promoting efficiency in space and expertise, the increased danger of cybercrime is on every CISOs mind.

  • When conducting a risk assessment, should we use another SaaS, or if this defeating the purpose?
  • Bringing it back home, how can we use people to work more efficiently and bring trust back with our vendors?
Keynote
12:30pm - 1:00pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Accelerating Solutions for Modern Data Privacy and Security Challenges
headshot of Jim Barkdoll
Jim Barkdoll
CEO - Titus
headshot of Gary Moore
Gary Moore
Director, Cyber Security Operations - Data Protection and Third Party Risk - Ally Financial

With the influx of data privacy laws alongside a never-ending amount of data created and consumed daily, organizations struggle with how to properly identify and secure their most sensitive data.  In this session Jim Barkdoll, CEO of Titus, the data classification experts, will sit down with Ally Bank’s Gary Moore, Director, Cyber Security Operations & Data Security to discuss the steps Ally took to address these issues and best practices attendees can leverage within their own organizations. Specifically, Jim and Gary will cover:

  • The state of the modern data privacy landscape, including legislation;
  • The business problems Ally was facing and the impact they were having both on the IT and security departments as well as other lines of business;
  • The key considerations Ally made before deciding on a go forward data security program;
  •  Details on the methodology Ally used and what the results have been so far; and
  • Best practices enterprises can leverage based on the Ally experience and methodology.
Networking Lunch
1:00pm - 1:45pm

Worked up an appetite? Recharge those batteries with our buffet-style lunch, and prepare to meet the afternoon head-on.

Roundtable
Session 2 - Discovery
1:45pm - 2:30pm
Learning and sharing with your group. What are the solutions? Are they readily available? What path are you going to take?
Drill Down Roundtables

Track 1: Don’t Avert Your Eyes: Continuously Assessing the Threat Environment Against Emerging Technologies

Track 2: Cyber-Hygiene: Educating the Workforce and Creating Impact in Professional and Personal Environments

Track 3: Third-Party Providers: Building Effective Relationship to Reduce Unmanaged Risk

Track 4: Achieving Equilibrium: Balancing Security and Compliance to Protect Infrastructure

Track 5: An Unstoppable Force: Merging Physical and Cyber Security for Total Organizational Strength

Track 6: Accomplishing Successful Digital Transformation: Effective Use of AI, IoT and Cloud

Workshop
2:35pm - 3:15pm
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Identify the Risk Quantum Computing Will Pose To Your Security Program
headshot of Chris Bontempo
Chris Bontempo
VP Security Marketing, Americas - IBM

Technology advancements are usually accompanied by new risks and quantum computing is no different. The sheer power it brings will put data at risk through its ability to compromise cryptography. Much of today’s encrypted communications, transactions and records need to be stored for the next 20 years, which is well into the expected time frame of practical quantum decryption devices being made available. It is, therefore, imperative that organizations start preparing now to reap only the benefits that great leap forward will bring.

Case Study
3:20pm - 4:00pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Threat Actors, Incident Response and Recovery

Details To Follow.

Case Study
4:05pm - 4:45pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Purchasing A Breach: Security Concerns in Mergers and Acquisitions

During M&A, companies will straight away look at business functions like finance and operations. But, what about security? Poor cyber hygiene can cost a company millions of dollars, and M&A puts company in a vulnerable position to potential cyber-attacks. More than a third of acquiring companies discover security problems, or even breaches, during the post-acquisition integration.

Attendee downtime
4:50pm - 7:00pm

Time for a well-deserved break in your busy schedules.

Networking drinks
7:00pm - 7:30pm

Time to kick off your heels, loosen those ties and get to know your fellow summit attendees. Relax, drinks are on us.

Dinner and entertainment
7:30pm - 10:00pm

Time for some fun; you’ve earned it. Join us for our second night’s dinner and entertainment. Details to follow.

Wednesday December 4, 2019
Breakfast
7:30 am - 8:20 am

The most important meal of the day. Get yourself set for a productive day by joining us for coffee, croissants and more.

Welcome Remarks
8:20 am - 8:30 am

Details To Follow.

Keynote
8:30 am - 9:00 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Surging Young Talent into Security Careers
headshot of Rick Doten
Rick Doten
VP Information Security - Centene
headshot of Daniel Sergile
Daniel Sergile
Deputy CISO - Ciox Healthcare
headshot of Randy Raw
Randy Raw
CISO - Veterans United Home Loans

The talent gap in cyber security has been reported as an industry crisis. Recent estimates should as many as 3.5 million unfilled positions in the industry by 2021. With hackers increasing the number of attacks and taking advantage of the lack of security officials in organizations, security executives are questioning how to push more people into a security career path.

  1. Do applicants require previous education, such as degrees, in background subjects around computer science and information technology? Can on-the-job training be enough for entry-level positions?
  2. What emerging roles can we expect to appear in the next 2 years?
  3. What opportunities can we offer our current employees to develop their skills and further their career progression?
  4. Should the industry put pressure on the government agencies to take more initiative on this?
Keynote
9:00 am - 9:20 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Upskilling for Security: Overcoming the Cyber Workforce Shortage
headshot of Grant Jacoby
Grant Jacoby
SVP IS Strategy & Info Assurance - Fifth Third Bank

Solving the cyber workforce shortage is perhaps the most important – long standing – challenges our economy will face. Skill gaps are exacerbated with rapid change and complexity, thus designing and executing an effective developmental process has become essential. As companies engage in a talent war for in-demand skills, such as artificial intelligence, data science, and cloud development & computing, leaders should be increasingly turning to internal training rather than external hiring.  This keynote outlines how to start establishing, improving and maintaining a cyber-developmental process to upskill your workforce quickly and effectively while being pegged to a clearer employee career path.

Coffee & Networking
9:20 am - 9:30 am
Case Study
9:30 am - 10:10 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Building a Global Security Center That Adds Value To Your Organization
headshot of Edward Schubert
Edward Schubert
Senior Director Global Security & Safety - McKesson

We speak with Ed Schubert from McKesson to understand their process of collecting, analyzing and delivering a successful transformation project that adds true value to their security function and total organization.

Workshop
10:15 am - 10:55 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Designing Security for the Future of Your Network
headshot of Thomas Wood
Thomas Wood
Global Enterprise and Service Provider Systems Engineering Manager, Cisco Cloud Security - Cisco

The network is evolving, but is your security keeping up with the pace of change? New developments in network architecture like software-defined WAN (SD-WAN) are helping organizations improve connectivity, reduce costs, and simplify management across all of their office locations. Instead of back hauling all traffic through the corporate network, more organizations are moving to direct internet access (DIA) for all or some of their remote and branch offices. There are clear benefits from these changes, including faster access to cloud applications and workloads. But what about the risks of digital transformation? Satellite offices and roaming users are now more vulnerable to attacks than ever, and attackers are exploiting those weaknesses.

Whether your cloud journey has just started or is well underway, you’ll learn about the latest trends in network transformation and how it impacts your security stack. We’ll discuss the pros and cons of embracing change, and explain how to evaluate and adopt cloud security platforms, ensuring that security remains a top priority for business leaders.

Roundtables
Session 3 - Outcomes
11:00 am - 11:40 am
What does it all mean. Tracing back through two days of work, where are we? What you are bringing back to the office with you.

Track 1: Don’t Avert Your Eyes: Continuously Assessing the Threat Environment Against Emerging Technologies

Track 2: Cyber-Hygiene: Educating the Workforce and Creating Impact in Professional and Personal Environments

Track 3: Third-Party Providers: Building Effective Relationship to Reduce Unmanaged Risk

Track 4: Achieving Equilibrium: Balancing Security and Compliance to Protect Infrastructure

Track 5: An Unstoppable Force: Merging Physical and Cyber Security for Total Organizational Strength

Track 6: Accomplishing Successful Digital Transformation: Effective Use of AI, IoT and Cloud

Panel Discussion
11:45 am - 12:30 pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Closing Panel & Wrap Up
headshot of Wayne Towson
Wayne Towson
Senior Director, Global Security - Abbott
headshot of Marco M. Morana
Marco M. Morana
SVP Application Security Architect And Cloud Security Lead - Citi
headshot of Lee Bailey
Lee Bailey
CISO - ABC Fine Wine & Spirits
headshot of Campbell Tucker
Campbell Tucker
Chief Privacy Officer - Novant Health
headshot of Derek Brink
Derek Brink
VP and Research Fellow - Aberdeen Group

We speak with the roundtable moderators to discuss our findings and takeaways on the 6 topics discussed over the last 3 days.

Buffet lunch
12:30 pm - 1:30 pm

Worked up an appetite? Recharge those batteries with our buffet-style lunch for your journey home.

Summit Location

Ritz Carlton, Lake Oconee, Georgia

Our events take place at some of the most prestigious venues in the world. Five-star accommodation, dining and amenities make attending one of our summits both business and pleasure. Being productive has never been so much fun.

Popular content from our Summits

GDS Summits host experts to help experts. Our speakers are leading executives willing to share their insight to change the industry and the world in critical ways.

To discuss how GDS Summits can help you solve your project challenges contact us on: 0117 921 4000 or email sayhello@gdsgroup.com.

Join us at the Upcoming Event

Don't miss out

Apply now