On 15-17 June 2020, the US edition of our Security Insight Summit will bring together senior decision-makers and business leaders from across North America to discuss current industry challenges and opportunities, how to get the most out of them – and where the emerging threats lie.

Key themes under discussion include: how to get ahead of the security curve with cyber intelligence; the importance of stemming breaches and bolstering defences; and why, with the health of IT infrastructures now business critical, security is now an organisational issue rather than merely an IT one.

From case studies that lift the lid on operations inside best-in-class organisations, to workshops and collaborative sessions that focus on real challenges and future technology innovations, to one-to-one meetings with industry peers offering practical advice tailored to your specific needs, the summit provides you with everything you need to implement your key projects more effectively.

Our Approach

Every GDS Summit has one stated aim: to help attending executives implement their key projects more effectively. We do this by developing an in-depth understanding of those executives' project needs, the business outcomes they want to achieve, and the challenges they face in terms of hitting those goals.

Who Attends

Our summits are designed for executives looking to take their business to the next level – from market-leading brands to disruptive new entrants. As such, we’ve worked with some of the world’s best-loved and most forward-thinking businesses.
Apply to attend

Past Attendees

At previous events we've helped executives from some the world's most significant firms - as well as the most forward-thinking - to address their project challenges.
Image of Campbell Tucker
Logo of Novant Health
Campbell Tucker
Chief Privacy Officer
Novant Health
Image of Marco Mirko Morana
Logo of Citi
Marco Mirko Morana
SVP Application Security & Innovation
Citi
Image of Raymond Lipps
Logo of Celgene
Raymond Lipps
CISO
Celgene
Image of Nimesh Mehta
Logo of National Life Group
Nimesh Mehta
CIO
National Life Group
Image of Heidi Salow
Logo of Leidos
Heidi Salow
CPO
Leidos
Image of Carsten Krause
Logo of ModusLink
Carsten Krause
CIO, CISO & SVP IT Ops
ModusLink
Image of Michael Marsilio
Logo of Paradies Lagardere
Michael Marsilio
CISO
Paradies Lagardere
Image of Chris White
Logo of IPG Group
Chris White
Deputy Chief Information Security Officer
IPG Group
Image of Tamika Bass
Logo of Georgia Department of Public Health
Tamika Bass
CISO
Georgia Department of Public Health
Image of Randy Raw
Logo of Veterans United Home Loans
Randy Raw
CISO
Veterans United Home Loans
Image of David Whipple
Logo of Apple Leisure Group
David Whipple
CISO
Apple Leisure Group
Image of Andrew Bjerken
Logo of Catalina
Andrew Bjerken
Global CISO & CPO
Catalina

6 Challenges in Security

Our summit is focused on solving your strategic challenges
  • Don't Avert Your Eyes: Continuously Assessing the Threat Environment Against Emerging Technologies
  • Cyber-Hygiene: Educating the Workforce and Creating Impact in Professional and Personal Environments
  • Third-Party Providers: Building Effective Relationships to Reduce Unmanaged Risk
  • Achieving Equilibrium: Balancing Security and Compliance to Protect Infrastructure
  • An Unstoppable Force: Merging Physical and Cyber Security for Total Organizational Strength
  • Accomplishing Successful Digital Transformation: Effective Use of AI, IoT and Cloud
Apply to attend

Past Summit Schedule

Day 1
Day 2
Day 3
Monday June 15, 2020
Registration
12:00pm - 6:00pm

Join us at 1.00 pm when registration opens to collect your badge, check-in, meet the on-site team, and start your 2.5 day Summit experience.

Solution provider briefing
1:15pm - 1:45pm

Our VP of Sales will brief you on the next 2 ½ days at the summit, giving you all the information you’ll need for your 1-2-1 meetings, the networking sessions and what to expect to maximise your summit experience.

Welcome remarks and delegate briefing
1:45pm - 2:00pm

Our Master of Ceremonies will kick off the Summit with a welcome brief and orientation session, giving you all the information you need to maximize your Summit experience.

Interview
2:00pm - 2:30pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Taking the Next Security Step - From Awareness to Culture

Almost 90% of cyber security breaches occur as a result of human error.

With the increase in interest in cyber security over the past few years, awareness has never been higher, but we are yet to see a change in behavior or a reduction in non-malicious insider threat.

  • How can you engender a positive security culture across your organization that encourages non-tech employees to ask questions, report incidents and engage in understanding threats?
  • How can you reduce fear within your organization regarding employees coming forward to report incidents and breaches?
Panel Discussion
2:30pm - 3:10pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
What is the Future of the CISO Role?
headshot of Michael Marsilio
Michael Marsilio
CISO - Paradies Lagardere

In a survey by PWC, although 60% of CISOs have a direct channel to the CEO in case of serious cyber incidents, 50% still report to the CIO. However, there is an increasing recognition that security issues exist outside of the IT realm.

  • How should the role of the CISO evolve in line with the changing security culture?
  • How is the increasing risk of cyber crime affecting the influence a CISO has within an organization?
  • Is it good practice for a CISO to report into the CIO?
  • Should CISOs be further empowered and have a seat on the board?
  • Will the role of the CISO cease to exist in 10 years?

 

 

Roundtable Track 1
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Closing the Security Skills Gap and Championing Diversity
  • How do you overcome a lack of skills in relation to emerging technologies?
  • How can greater diversity within your organization help to bridge the skills gap?
  • Does automation play a role in overcoming the lack of relevant skills?
  • How can organizations develop a workforce which is welcoming and accessible to those from a more diverse background?
Roundtable Track 2
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Developing a Positive Security Culture
  • How can you empower non-tech employees across the business to feel a willingness to understand, engage in and report security issues, thus embedding a positive security culture?
  • What is the role of employee awareness training in achieving this positive culture?
  • How can you champion the human aspect of security at every stage of your strategy?
  • Where is the tradeoff between security and end user experience and How will finding the right balance help your efforts to reduce non-malicious insider threat within your organization?
Roundtable Track 3
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Navigating the Compliance Minefield
headshot of Steven Abrahamson
Steven Abrahamson
Senior Director, Product Cyber Security - GE Healthcare
  • How do industry-specific compliance regulations impact an organization?
  • How do you communicate the business-value of compliance in a way that does not contribute to the perception of security as a barrier to innovation?
  • What is the role of automation in not only preventing breaches but in managing compliance across jurisdictions?
  • What is the impact of the CCPA on security departments within America? Will this impact be furthered if similar state legislation is passed as a result of the CCPA?
Roundtable Track 4
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Mitigating Security Risks from Emerging Technologies
headshot of Prabhakar Kasu
Prabhakar Kasu
Global Head of Cybersecurity Strategy & Architecture - Aon
  • How can you adapt your security strategy to account for changes in how IT is being consumed, e.g. the proliferation of connected devices, IoT, increasingly complex cloud systems and Bring Your Own Device (BYOD) culture?
  • How can you keep visibility of where your data is, and whether it is secure?
  • What different security skills are required to combat security risks within the changing landscape?
  • Can automation assist in these challenges?
Roundtable Track 5
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Overcoming the Fragmented Vendor Landscape
  • What is the best method of validating third-party providers in an increasingly buzzword-centric environment?
  • With the fragmented vendor landscape, how can you ensure there are no gaps within your security architecture?
  • How can you develop trust with your vendor partners to help you gain an understanding of your security beyond your ecosystem?
  • Will more of a partner-ecosystem ease the issues within the vendor landscape?
Roundtable Track 6
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Where do you see Yourself in 10 Years: The Evolution of the CISO Role
  • With security risks changing, how should the CISO role evolve in line with the changing landscape?
  • Where should CISOs sit within your organization? Should CISOs report into CIOs/COOs/CFOs?
  • Should CISOs be further empowered in order to help prevent security breaches?
  • How can security professionals position themselves in a way which increases their ROI for the business?
Workshop
4:20pm - 5:00pm
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Championing Diversity: Bridging the Security Skills Gap

The evolving risks in cybersecurity mean that a wider range of skills are required within the industry. As a result, the current cybersecurity workforce gap in the US is nearly 500,000 and the global gap is over 4M. However, the levels of diversity are low. Women are estimated to make up only 11% of the US cyber workforce, with 26% of the cyber workforce globally being a minority.

  • How can you embrace the neurodiverse skillset to remedy a shortage of technical skills?
  • How may inclusion lead to innovation?
  • How can organizations find methods to fill hard-to-fill vacancies?
Workshop
5:05pm - 5:45pm
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Patching vs The Emerging Technologies

The changing cyber threat landscape has meant that companies have placed a focus on emerging technologies to combat the issue. Methods such as red teams/blue teams are used in order to evolve the security department in a way which fits with the new IT landscape. However, Equifax’s breach in 2017 showcases that basics like patching should remain a focus. Should patching be a priority within your organization, or should businesses still focus on new ways to prevent cyber threats?

Attendee Downtime
5:45pm - 6:00pm

Take a well-earned break before joining us for networking drinks.

Networking drinks
6:00pm - 7:00pm

A casual setting to network and meet the rest of the attendees and discuss relevant topics at your leisure.

Gala dinner
7:00pm - 10:00pm

Join us for our Gala Dinner & Keynote Speaker. An opportunity to network with your peers in a social environment with a three course dinner and wine whilst listening to an industry leader discuss a key topic.

Tuesday June 16, 2020
Breakfast
7:00am - 7:50am

Please come down and join us for breakfast and prepare for a day of workshops, keynotes, debates and panels.

Welcome Remarks
7:50am - 8:00am

Our Master of Ceremonies will brief you into the day 2 program to make sure you are in the right place at the right time.

Keynote
8:00am - 8:30am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
CCPA … Can California Pressure America?

Despite the CCPA coming into effect in January 2020, 86% of participants in a recent survey stated they were not prepared to be compliant with the new Californian law. With the CCPA expected to be more stringent than GDPR, will the CCPA act as a catalyst for other similar legislation in the US?

  • How long will it take for organizations to be compliant with the CCPA?
  • How much of an impact will the CCPA have on US businesses?
  • Are there ways in which you can automate the compliance process?
  • Is the CCPA going to trigger other US States to pass similar legislation?
Keynote
8:30am - 9:00am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
‘Playing Chess with Yourself’: Thinking Like A Hacker

In order to truly understand your threat landscape, you need to be able to answer the question; ‘Are your critical assets secure?’ at any given moment.

  • What is the role of breach and attack simulation (BAS) platforms in providing this continuous intelligence?
  • How can thinking like a hacker help you to develop in line with the future of cybersecurity hacks?
Oxford Style Debate and Live Polling
9:00am - 9:40am
One Topic. Two experts. Two opinions. You'll get the chance to vote on where you stand before the session starts. We'll then hear from our two experts, to see if they can sway your opinion when you participate in the closing vote.
Are Privacy and Security the Same Side of the Coin?

Whether privacy or security prevails when discussing your security strategy has been long debated. However, is the privacy v security debate a false dichotomy? In this oxford style debate, our speakers will be discussing whether privacy and security are in fact the same side of the coin and should be considered in conjunction.

Coffee & Networking Break
9:40am - 10:00am

Take a break and refuel whilst networking and socializing with your peers.

Workshop
10:00am - 10:40am
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
The Hacker's Paradise? 5G and Cyber Security

5G is developing fast. Reports suggest that by 2024, global 5G subscriptions could hit 1.9bn. With 5G enabling more entry points for cyberattacks, how can organizations begin to protect themselves from this new threat?

Workshop
10:45am - 11:25am
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Do You Have Your Head in the Cloud?

One of the fundamental strengths of the cloud is also one of its biggest weakness, namely that it extends access to data and applications for users and, with this, leads to an increased risk of breaches.

  • How do you ensure that you are properly managing your cloud security?
  • Do we need to rethink access management? Has the password reached its sell by date and, if so, what is the role of multifactor authentication and biometrics in replacing it?
Keynote
11:30am - 12:00pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Utilizing Automation to Overcome a Lack of Technical Skills

The lack of development in technical skill sets are leaving security departments lagging behind attackers.
What role can automation play in ensuring your organization is fully prepared in the case of an attack?

Networking Lunch
12:00pm - 1:15pm

Join us for a sit-down lunch, and a chance to catch up on emails and get ready for the afternoon.

Roundtable
Session 2 - Drill Down
1:15pm - 2:30pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Drill Down Roundtables

Track 1: Closing the Security Skills Gap and Championing Diversity

Track 2: Developing a Positive Security Culture

Track 3: Navigating the Compliance Minefield 

Track 4: Mitigating Security Risks from Emerging Technologies

Track 5: Overcoming the Fragmented Vendor Landscape 

Track 6: Where do you see Yourself in 10 Years: The Future of the CISO Role 

Workshop
2:35pm - 3:15pm
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Doing More With Less - The Budget Issue

A recent Gartner report stated that cyber crime is now costing the global economy $5.2 trillion. Despite this, Gartner state that organizations spend on average 5.6% of their overall IT budget on cybersecurity, and some companies’ security budgets are falling year on year. – How can you protect your organization from cyber threats with less budget? – Steps to take in order to gain C-Level buy in to support security – How a strong sense of security culture can play a part in gaining security budget support – The importance of aligning your security budget with business needs

Workshop
3:20pm - 4:00pm
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
The Dark Side of Your Supply Chain
headshot of Tim Swope
Tim Swope
CISO - Catholic Health Services

The cyber security threat to an organization’s supply chain is an increasing reality. A Global Incidence Threat Report found that 50% of cyber-attacks focus on supply chains and at least 70% attempt some sort of lateral movement. How important is it to assess the security threat within your supply chain?

  • How are supply chains vulnerable to cyber-attack?
  • What lessons can be learnt from supply chain breaches such as Target’s breach in 2013?
  • How can you assess the security strength of your supply chain?
  • What steps can be taken to secure your supply chain?
Coffee & Networking Break
4:00pm - 4:15pm

Take a break and refuel whilst networking and socializing with your peers.

Keynote
4:15pm - 4:45pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Securing Value - Aligning your Strategy

A recent survey suggests that only 27% of CISOs strongly agree that they feel as aligned with the business as they ought to be. – How do you change the perception of security as the ‘no’ function in the business and present it instead as an enabler? – How can you ensure your security strategy meets the needs of the business? – The importance of delivering your security strategy in an accessible manner

Attendee downtime
5:15pm - 6:45pm

A needed break after a content filled day. Please use this time as you wish prior to joining us for our night 2 seated dinner.

Networking drinks
6:45pm - 7:30pm

A casual setting to network and meet the rest of the attendees and discuss relevant topics at your leisure.

Dinner and entertainment
7:30pm - 10:00pm

Join us for our night two Gala Dinner, which will be in a casual and inviting setting.

Wednesday June 17, 2020
Breakfast
7:00 am - 7:50 am

Please come down and join us for breakfast and prepare for a day of workshops, keynotes, debates and panels.

Welcome Remarks
7:50 am - 8:00 am

Our Master of Ceremonies will brief you into the day 3 program to make sure you are in the right place at the right time.

Keynote
8:00 am - 8:30 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Is There an Overreliance on Biometrics?

The global biometric market is expected to top USD 50 Billion by 2024. People are beginning to move away from traditional passwords, with 89% of consumers already being familiar with biometrics. However, with so much sensitive consumer information being stored and at risk of security breach (i.e. fingerprints, facial recognition), do we have an overreliance on biometrics?

Workshop
8:35 am - 9:15 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Turning Weakness into Strength: How to Handle Reputational Damage Following a Breach

While GDPR has increased insight into the sheer number of breaches occurring on a daily basis, there is still a tendency for organisations to be demonised in the media following a breach, encouraging victims to cover up the incident and refrain from discussing it publicly. This is extremely damaging from a collective defence perspective and leads to missed opportunities for sharing, collaboration and prevention in the community.

  • How can you actually bolster your reputation following a breach by being honest, open and collaborative?
Workshop
9:20 am - 10:00 am
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Stability and Security: Tackling The Convergence of OT and IT

The convergence of OT and IT has led hackers to target critical infrastructure as they are able to move efficiently between the two environments while IoT sensors make it increasingly difficult to know where your data is and whether it is secure.

  • How do we maintain the integrity of OT in the name of stability while securing this process to allow for innovation?
Coffee & Networking
10:20 am - 10:30 am

Take a break and refuel whilst networking and socializing with your peers.

Roundtable
Session 3 - Outcomes
10:05 am - 11:00 am
What does it all mean? Tracing back through two days of work, where are we? What are you bringing back to the office with you?
Drill Down Roundtables

Track 1: Closing the Security Skills Gap and Championing Diversity
Track 2: Developing a Positive Security Culture
Track 3: Navigating the Compliance Minefield
Track 4: Mitigating Security Risks from Emerging Technologies
Track 5: Overcoming the Fragmented Vendor Landscape
Track 6: Where do you see Yourself in 10 Years: The Future of the CISO Role

Keynote
11:00 am - 11:30 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Building Constructive Vendor Relationships in a Fragmented Vendor Landscape

In the security industry especially, a shortage of skills along with the nature of the game itself necessitates a third-party infrastructure if you want to secure your organization and its assets.
However, when asked if they would recommend their providers, CISOs reported a Net Promoter Score of -31 (with 0 being neutral).
With nearly half of firms suffering breaches at the hands of vendors, how do you form a positive and informative relationship with your vendors that allows you to gain visibility on your security beyond your ecosystem?

Summit Location

National Doral, Miami, Florida

Popular content from our Summits

GDS Summits host experts to help experts. Our speakers are leading executives willing to share their insight to change the industry and the world in critical ways.

To discuss how GDS Summits can help you solve your project challenges contact us on: 0117 921 4000 or email sayhello@gdsgroup.com.

Sponsors & Partners

Media Partners

Join us at the Upcoming Event

Don't miss out

Apply now