On 21-23 May 2019, the US edition of our Security Insight Summit will bring together senior decision-makers and business leaders from across North America to discuss current industry challenges and opportunities, how to get the most out of them – and where the emerging threats lie.

Key themes under discussion include: how to get ahead of the security curve with cyber intelligence; the importance of stemming breaches and bolstering defences; and why, with the health of IT infrastructures now business critical, security is now an organisational issue rather than merely an IT one.

From case studies that lift the lid on operations inside best-in-class organisations, to workshops and collaborative sessions that focus on real challenges and future technology innovations, to one-to-one meetings with industry peers offering practical advice tailored to your specific needs, the summit provides you with everything you need to implement your key projects more effectively.

Our Approach

Every GDS Summit has one stated aim: to help attending executives implement their key projects more effectively. We do this by developing an in-depth understanding of those executives' project needs, the business outcomes they want to achieve, and the challenges they face in terms of hitting those goals.

Who Attends

Our summits are designed for executives looking to take their business to the next level – from market-leading brands to disruptive new entrants. As such, we’ve worked with some of the world’s best-loved and most forward-thinking businesses.
Apply to attend

Attendees Include

The upcoming summit will welcome executives from some of the world's biggest and most recognisable firms - as well as the most forward-thinking - as they look to address their project challenges.
Image of Todd Fennell
Todd Fennell
VP Information Security
American Express
Image of Richard Rushing
Richard Rushing
CISO
Motorola Mobility
Image of Aaron Rinehart
Aaron Rinehart
Chief Enterprise Security Architect
UnitedHealth Group
Image of David Nagel
David Nagel
CISO
Genuine Parts Company
Image of David Smith
David Smith
VP Technology
State Street
Image of Scot Pflug
Scot Pflug
SVP Chief Information Security Office
First National Bank
Image of Ruben Chacon
Ruben Chacon
VP and CISO
Constellation Brands
Image of Jim Kastle
Jim Kastle
CISO
Conagra Brands
Image of Walter Alexander Specogna
Walter Alexander Specogna
Head Of Information Security
Bell Canada
Image of Christopher Knauer
Christopher Knauer
SVP Chief Security Officer
The Sitel Group
Image of Bhavesh Jani
Bhavesh Jani
SVP Global Information Security
Citibank
Image of Richard Corbett
Richard Corbett
CTO
New York & Company

6 Challenges in Security

Our summit is focused on solving your strategic challenges
  • Keeping ahead of the threat environment – new modes of attack and increased points of vulnerability
  • Dealing with changing attitudes to privacy and security in a data-centric, millennial-driven world
  • Securing the boundary-less organization in an age of cloud-first, mobile working and always-on
  • Budgets and resources – striking a balance between breach prevention and incident response
  • Building the right culture: security by design, influencing behaviors and taking a risk-based approach
  • Compliance with a complex, ever-changing and often contradictory regulatory landscape
Apply to attend

Summit Schedule

3 Days - 3 Summit Themes - 15 Workshops
Day 1
Day 2
Day 3
Tuesday May 21, 2019
Summit registration
1:00pm - 6:00pm

Grab your name badge, say hello, activate the onsite app and prepare to leave the office behind for two-and-a-half days of networking, learning and intelligence gathering.

Welcome address
3:30pm - 3:45pm

What? When? How? Where? Join our Master of Ceremonies for a brief welcome and orientation session, where we’ll explain your itinerary for the next few days.

Keynote Speech
3:45pm - 4:25pm
Keynote panel discussion: Security and the pace of change
Roundtable
4:30pm - 6:00pm
Track 1: Threat prevention: securing the boundary-less organization
Roundtable
4:30pm - 6:00pm
Track 2: Incident response: mitigating risks and minimizing losses
Roundtable
4:30pm - 6:00pm
Track 3: Security forecast: emerging threats and new approaches
Solution provider briefing
4:30pm - 4:40pm

Details To Follow.

Cocktail reception
6:00pm - 7:00pm

Time to kick off your heels, loosen those ties and get to know your fellow summit attendees. Relax, drinks are on us.

Gala dinner & keynote
7:00pm - 10:00pm

From independent thinkers to technology pioneers to execs from some of the world’s most progressive brands, our keynote speakers are handpicked to provide you with the insight you need to inspire your next business decision.

Wednesday May 22, 2019
Breakfast
7:00am - 8:00am

The most important meal of the day. Get yourself set for a productive day by joining us for coffee, croissants and more.

Keynote Speech
8:05am - 8:30am
Keynote address: Security principles and the movies: what Hollywood can teach us about security
Collaborate: the big debate
8:35am - 9:30am

Applying the zero trust model
The Zero Trust model centres on the belief that organizations should verify everything trying to connect to their systems – both inside and outside the perimeter – before granting access. So can zero trust be a model for effective security at your organization? Can it be retrofitted or must it be baked in? And if so, where do you get started?

Addressing the security skills shortage
Changes in cybersecurity will require new types of skills in data science and analytics. The general increase in information will mean artificial security intelligence is necessary. Adaptive skills will be key for the next phase of cybersecurity. But where do you find them?

Forget DevOps, is it time for DevSecOps?
With the pace of change creating an endless connection between development and operations, it’s increasingly important to stop running them as isolated units. So does the same logic apply to security? Is it time to stop running security as a separate team?

Approaches to cyber insurance
Analysts expect to see significant losses for insurance firms that have mispriced the risk of a data breach. It could mean insurers increasing premiums, narrowing the scope of cover or even withdrawing from the market altogether. Do we need a better security safety net?

Threat prevention vs. incident response
Are budget and resource constraints forcing you to choose between threat prevention and incident response? For an increasing number of firms, the answer is ‘yes’. But should these be separate budget considerations, operated by separate teams? How do you strike the right balance?

Cyber security and the c-suite
Getting board-level buy-in is critical for any business project. So how do you effectively raise security awareness in the C-suite? How do you communicate with the board in language that resonates? How do you justify your security spending and, just as importantly, get budget to do more?

Workshop
9:35am - 10:15am
Session 1: Developing a security-centric culture
Workshop
10:20am - 11:00am
Session 2: Lessons from retail: dealing with data
Coffee & networking
11:00am - 11:20am

Take advantage of time to network with fellow summit attendees and further discuss your business transformation projects.

Workshop
11:20am - 12:00pm
Session 3: Prioritizing cyber risk
Workshop
12:05pm - 12:45pm
Session 4: Security implications of the public cloud
Workshop
12:50pm - 1:30pm
Session 5: The weakest link: security and the supply chain
Lunch & networking
1:30pm - 2:30pm

Worked up an appetite? Recharge those batteries with our buffet-style lunch, and prepare to meet the afternoon head-on.

Workshop
2:30pm - 3:10pm
Session 6: Securing access anywhere: balancing productivity with protection
Workshop
3:15pm - 3:55pm
Session 7: Measuring security effectiveness
Coffee & networking
3:55pm - 4:05pm

Take advantage of time to network with fellow summit attendees and further discuss your business transformation projects.

Workshop
4:05pm - 4:45pm
Session 8: Lessons from healthcare: dealing with ransomware
Workshop
4:50pm - 5:30pm
Session 9: Security and the internet of things
Attendee downtime
5:30pm - 7:00pm

Time for a well-deserved break in your busy schedules.

Dinner & experience
7:00pm - 10:00pm

Time for some fun; you’ve earned it. Join us for our second night’s dinner and entertainment. Details to follow.

Thursday May 23, 2019
Breakfast
7:30 am - 8:30 am

The most important meal of the day. Get yourself set for a productive day by joining us for coffee, croissants and more.

Workshop
8:30 am - 9:10 am
Session 10: Man versus machine: security in the age of AI
Workshop
9:15 am - 9:55 am
Session 11: Deception and the art of defense
Workshop
10:00 am - 10:40 am
Session 12: Lessons from financial services: safeguarding digital identity
Coffee & networking
10:40 am - 10:50 am

Take advantage of time to network with fellow summit attendees and further discuss your business transformation projects.

Workshop
10:50 am - 11:30 am
Session 13: Blockchain: a game changer for cyber?
Workshop
11:35 am - 12:15 pm
Session 14: The state of security in 2018: where we’ve been and where we’re going next
Workshop
12:20 pm - 1:00 pm
Session 15: Talking points and key takeaways
Lunch & farewells
1:00 pm - 2:00 pm

Worked up an appetite? Recharge those batteries with our buffet-style lunch for your journey home.

Summit Location

The Ritz-Carlton, Amelia Island, Florida

Our events take place at some of the most prestigious venues in the world. Five-star accommodation, dining and amenities make attending one of our summits both business and pleasure. Being productive has never been so much fun.

Latest Case Study

Senior executives love our summits because of the unparalleled opportunity to meet people with ideas on how to move their key projects forward. But don’t just take our word for it…

To discuss how GDS Summits can help you solve your project challenges contact us on: 0117 921 4000 or email sayhello@gdsgroup.com.