On 21-23 May 2019, the US edition of our Security Insight Summit will bring together senior decision-makers and business leaders from across North America to discuss current industry challenges and opportunities, how to get the most out of them – and where the emerging threats lie.

Key themes under discussion include: how to get ahead of the security curve with cyber intelligence; the importance of stemming breaches and bolstering defences; and why, with the health of IT infrastructures now business critical, security is now an organisational issue rather than merely an IT one.

From case studies that lift the lid on operations inside best-in-class organisations, to workshops and collaborative sessions that focus on real challenges and future technology innovations, to one-to-one meetings with industry peers offering practical advice tailored to your specific needs, the summit provides you with everything you need to implement your key projects more effectively.

Our Approach

Every GDS Summit has one stated aim: to help attending executives implement their key projects more effectively. We do this by developing an in-depth understanding of those executives' project needs, the business outcomes they want to achieve, and the challenges they face in terms of hitting those goals.

Who Attends

Our summits are designed for executives looking to take their business to the next level – from market-leading brands to disruptive new entrants. As such, we’ve worked with some of the world’s best-loved and most forward-thinking businesses.
Apply to attend

Attendees Include

The upcoming summit will welcome executives from some of the world's biggest and most recognisable firms - as well as the most forward-thinking - as they look to address their project challenges.
Image of Andy Kim
Andy Kim
CISO eBusiness
Image of Jonathan Fowler
Jonathan Fowler
Image of David Tyburski
David Tyburski
Wynn Resorts
Image of Kausar Kenning
Kausar Kenning
Head, Cyber Security Insights
Image of Michael Woods
Michael Woods
Director Cyber Security Global Operations
Image of Nasser Fattah
Nasser Fattah
MD Technology
MUFG Union Bank
Image of Parveen Malik
Parveen Malik
AVP InfoSec Impl
State Street
Image of Rodney Strader
Rodney Strader
VP Security Operations
Discovery Communications
Image of Lee Carsten
Lee Carsten
VP Cyber Solutions
Image of Allan Alford
Allan Alford
Image of Bradley J. Schaufenbuel
Bradley J. Schaufenbuel
Paylocity Holding Corporation
Image of Scott Mathis
Scott Mathis

6 Challenges in Security

Our summit is focused on solving your strategic challenges
  • Keeping ahead of the threat environment – new modes of attack and increased points of vulnerability
  • Dealing with changing attitudes to privacy and security in a data-centric, millennial-driven world
  • Securing the boundary-less organization in an age of cloud-first, mobile working and always-on
  • Budgets and resources – striking a balance between breach prevention and incident response
  • Building the right culture: security by design, influencing behaviors and taking a risk-based approach
  • Compliance with a complex, ever-changing and often contradictory regulatory landscape
Apply to attend

Summit Schedule

3 Days - 3 Summit Themes - 15 Workshops
Day 1
Day 2
Day 3
Tuesday May 21, 2019
Summit registration
1:00pm - 6:00pm

Grab your name badge, say hello, activate the onsite app and prepare to leave the office behind for two-and-a-half days of networking, learning and intelligence gathering.

Welcome address
3:30pm - 3:45pm

What? When? How? Where? Join our Master of Ceremonies for a brief welcome and orientation session, where we’ll explain your itinerary for the next few days.

Keynote Speech
3:45pm - 4:25pm
Keynote panel discussion: Security and the pace of change
4:30pm - 6:00pm
Track 1: Threat prevention: securing the boundary-less organization
headshot of Scott Mathis
Scott Mathis
4:30pm - 6:00pm
Track 2: Incident response: mitigating risks and minimizing losses
headshot of Dr. David W. Loewy
Dr. David W. Loewy
CISO - SUNY Downstate Medical Center
4:30pm - 6:00pm
Track 3: Security forecast: emerging threats and new approaches
Solution provider briefing
4:30pm - 4:40pm

Details To Follow.

Cocktail reception
6:00pm - 7:00pm

Time to kick off your heels, loosen those ties and get to know your fellow summit attendees. Relax, drinks are on us.

Gala dinner & keynote
7:00pm - 10:00pm

From independent thinkers to technology pioneers to execs from some of the world’s most progressive brands, our keynote speakers are handpicked to provide you with the insight you need to inspire your next business decision.

Wednesday May 22, 2019
7:00am - 8:00am

The most important meal of the day. Get yourself set for a productive day by joining us for coffee, croissants and more.

Keynote Speech
8:05am - 8:30am
Keynote address: Security principles and the movies: what Hollywood can teach us about security
Collaborate: the big debate
8:35am - 9:30am

Applying the zero trust model
The Zero Trust model centres on the belief that organizations should verify everything trying to connect to their systems – both inside and outside the perimeter – before granting access. So can zero trust be a model for effective security at your organization? Can it be retrofitted or must it be baked in? And if so, where do you get started?

Addressing the security skills shortage
Changes in cybersecurity will require new types of skills in data science and analytics. The general increase in information will mean artificial security intelligence is necessary. Adaptive skills will be key for the next phase of cybersecurity. But where do you find them?

Forget DevOps, is it time for DevSecOps?
With the pace of change creating an endless connection between development and operations, it’s increasingly important to stop running them as isolated units. So does the same logic apply to security? Is it time to stop running security as a separate team?

Approaches to cyber insurance
Analysts expect to see significant losses for insurance firms that have mispriced the risk of a data breach. It could mean insurers increasing premiums, narrowing the scope of cover or even withdrawing from the market altogether. Do we need a better security safety net?

Threat prevention vs. incident response
Are budget and resource constraints forcing you to choose between threat prevention and incident response? For an increasing number of firms, the answer is ‘yes’. But should these be separate budget considerations, operated by separate teams? How do you strike the right balance?

Cyber security and the c-suite
Getting board-level buy-in is critical for any business project. So how do you effectively raise security awareness in the C-suite? How do you communicate with the board in language that resonates? How do you justify your security spending and, just as importantly, get budget to do more?

9:35am - 10:15am
Session 1: Strengthening organization’s vendor management programs with information security.
headshot of Nasser Fattah
Nasser Fattah
MD Technology - MUFG Union Bank
10:20am - 11:00am
Session 2: Lessons from retail: dealing with data
Coffee & networking
11:00am - 11:20am

Take advantage of time to network with fellow summit attendees and further discuss your business transformation projects.

11:20am - 12:00pm
Session 3: Prioritizing cyber risk
12:05pm - 12:45pm
Session 4: Security implications of the public cloud
12:50pm - 1:30pm
Session 5: The weakest link: security and the supply chain
Lunch & networking
1:30pm - 2:30pm

Worked up an appetite? Recharge those batteries with our buffet-style lunch, and prepare to meet the afternoon head-on.

2:30pm - 3:10pm
Session 6: Securing access anywhere: balancing productivity with protection
3:15pm - 3:55pm
Session 7: TBC
headshot of Allan Alford
Allan Alford
CISO - Mitel
Coffee & networking
3:55pm - 4:05pm

Take advantage of time to network with fellow summit attendees and further discuss your business transformation projects.

4:05pm - 4:45pm
Session 8: Lessons from healthcare: dealing with ransomware
4:50pm - 5:30pm
Session 9: Security and the internet of things
Attendee downtime
5:30pm - 7:00pm

Time for a well-deserved break in your busy schedules.

Dinner & experience
7:00pm - 10:00pm

Time for some fun; you’ve earned it. Join us for our second night’s dinner and entertainment. Details to follow.

Thursday May 23, 2019
7:30 am - 8:30 am

The most important meal of the day. Get yourself set for a productive day by joining us for coffee, croissants and more.

8:30 am - 9:10 am
Session 10: Man versus machine: security in the age of AI
9:15 am - 9:55 am
Session 11: Deception and the art of defense
10:00 am - 10:40 am
Session 12: Lessons from financial services: safeguarding digital identity
Coffee & networking
10:40 am - 10:50 am

Take advantage of time to network with fellow summit attendees and further discuss your business transformation projects.

10:50 am - 11:30 am
Session 13: Blockchain: a game changer for cyber?
11:35 am - 12:15 pm
Session 14: The state of security in 2019: where we’ve been and where we’re going next
12:20 pm - 1:00 pm
Session 15: Talking points and key takeaways
Lunch & farewells
1:00 pm - 2:00 pm

Worked up an appetite? Recharge those batteries with our buffet-style lunch for your journey home.

Summit Location

The Ritz-Carlton, Amelia Island, Florida

Our events take place at some of the most prestigious venues in the world. Five-star accommodation, dining and amenities make attending one of our summits both business and pleasure. Being productive has never been so much fun.

Latest Case Study

Senior executives love our summits because of the unparalleled opportunity to meet people with ideas on how to move their key projects forward. But don’t just take our word for it…

To discuss how GDS Summits can help you solve your project challenges contact us on: 0117 921 4000 or email sayhello@gdsgroup.com.

Join us at the Upcoming Event

Don't miss out

Apply now