Closing the gap on cyber threats through communication, collaboration and innovation

On 11-13 May 2020, the European edition of our Security Insight Summit will bring together senior security decision-makers and business leaders from across the continent to discuss the latest trends, emerging threats and new ways of thinking – and how best to make security work for your business.

The summit will focus on key topics such as adapting your security strategy to accommodate changes in IT consumption, effectively communicating the importance of security to business leaders, embedding a positive security culture, navigating a fragmented vendor landscape, overcoming the technical skills gap and perfecting compliance across multiple jurisdictions.

From case studies that lift the lid on operations inside best-in-class organisations, to workshops and collaborative sessions that focus on real challenges and future technology innovations, to one-to-one meetings with industry peers offering practical advice tailored to your specific needs, the summit provides you with everything you need to implement your key projects more effectively.

Our Approach

Every GDS Summit has one stated aim: to help attending executives implement their key projects more effectively. We do this by developing an in-depth understanding of those executives' project needs, the business outcomes they want to achieve, and the challenges they face in terms of hitting those goals.

Who Attends

Our summits are designed for executives looking to take their business to the next level – from market-leading brands to disruptive new entrants. As such, we’ve worked with some of the world’s best-loved and most forward-thinking businesses.
Apply to attend

Past Attendees

At previous events we've helped executives from some the world's most significant firms - as well as the most forward-thinking - to address their project challenges.
Image of Nick Lyngaae
Logo of Telia
Nick Lyngaae
CISO/Head of Security
Telia
Image of Stephane Nappo
Logo of Societe Generale
Stephane Nappo
Global CISO
Societe Generale
Image of Aernout Reijmer
Logo of ASML
Aernout Reijmer
CISO
ASML
Image of Niamh Muldoon
Logo of DocuSign
Niamh Muldoon
EU Information Security Director
DocuSign
Image of Achim Knebel
Logo of Siemens AG
Achim Knebel
CISO
Siemens AG
Image of Carlo Spada
Logo of Essilor
Carlo Spada
CISO
Essilor
Image of Mads Syska Hasling
Logo of Saxo Bank
Mads Syska Hasling
CISO
Saxo Bank
Image of Anwar Mirza
Logo of TNT
Anwar Mirza
Global Head of Data Governance
TNT
Image of Fotis Papazafeiropoulos
Logo of Coca-Cola Hellenic Bottling Company
Fotis Papazafeiropoulos
Group Cyber Security Director / CISO
Coca-Cola Hellenic Bottling Company
Image of Nuno Medeiros
Logo of EDP Distribuição
Nuno Medeiros
CISO
EDP Distribuição
Image of Claudio Paganelli
Logo of Gruppo Metaenergia
Claudio Paganelli
CIO & CISO
Gruppo Metaenergia
Image of Teemu Ylhaisi
Logo of OP Financial Group
Teemu Ylhaisi
CSO
OP Financial Group

6 Challenges in Security

Our summit is focused on solving your strategic challenges
  • Securing an increasingly diverse and boundless environment
  • Communicating the business impact of your security strategy and developing metrics to showcase this
  • Embedding a positive security culture across your organisation
  • Addressing the technical skills gap and championing diversity in the security industry
  • Negotiating the fragmented vendor landscape, overcoming lack of trust and mitigating third party risk
  • Ensuring compliance across jurisdictions with varying and often contrary privacy legislations
Apply to attend

Summit Schedule

Day 1
Day 2
Day 3
Monday May 11, 2020
Registration
12:00pm - 6:00pm

Join us at 12.00 pm when registration opens to collect your badge, check-in, meet the on-site team, and start your 2.5 day Summit experience.

Solution provider briefing
1:15pm - 1:45pm

Our VP of Sales will brief you on the next 2 ½ days at the summit, giving you all the information you’ll need for your 1-2-1 meetings, the networking sessions and what to expect to maximise your summit experience.

Welcome remarks and delegate briefing
1:45pm - 2:00pm

Our Master of Ceremonies will kick off the Summit with a welcome brief and orientation session, giving you all the information you need to maximise your summit experience.

Interview
2:00pm - 2:30pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Diverse and disparate: defining your security environment
headshot of David Ferbrache OBE
David Ferbrache OBE
Global Head of Cyber Futures - KPMG

According to Gartner, more people are now accessing your network and applications from outside your organisation using remote, off prem devices than inside. This, along with the proliferation of connected devices and complex cloud systems, is making it increasingly difficult to understand where your data is, who has access to it and whether it’s secure.

  • How must our attitude to security change to reflect the way that we consume I.T?
  • How do you establish visibility over an increasingly diverse and boundless landscape?
Panel Discussion
2:30pm - 3:10pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
An enabler not a barrier: communicating the business value of security

According to this year’s ClubCISO InfoSec Maturity Report, only 27% of CISOs strongly agree that they feel as aligned with the business as they ought to be.

  • How do you change the perception of security as the ‘no’ function in the business and present it instead as an enabler?
  • How can you communicate your security strategy in a language that is accessible to traditional business leaders?
  • How do you build the business-facing value-creation capabilities of your team?
Roundtable Track 1
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Securing an increasingly diverse and boundless environment
headshot of Giacomo Collini
Giacomo Collini
Former VP Information Security - Hello Fresh
  • How can you adapt your security strategy to account for changes in how IT is being consumed, e.g. Bring Your Own Device (BYOD) culture, the proliferation of connected devices (IoT) and increasingly complex cloud systems?
  • With these changes leading to the disappearance of perimeters, how do you answer these key questions; Where is your data? Who has access to it? Is it secure?
  • If you can’t protect what you can’t see, how do you establish visibility over such an environment?
  • What is the role of automation in overcoming this challenge?
Roundtable Track 2
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Communicating the business impact of your security strategy and developing metrics to showcase this
headshot of David Shaw
David Shaw
Head of Information Security - Central Bank of Ireland
  • Is security perceived as a barrier to innovation in your organisation? How can you effectively communicate its importance in a language accessible to business leaders?
  • How do you tie your proposed actions – people, processes, technology – to risk against business-plan objectives?
  • How should we structure metrics to measure ROI on security projects, the success of CISOs and the value they bring?
  • How will the role of the CISO evolve over the next 5 – 10 years as security becomes a more and more holistic concern within organisations?
Roundtable Track 3
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Embedding a positive security culture across your organisation
headshot of Oliver Carr
Oliver Carr
Head of Cyber Security Architecture - innogy SE
  • How can you empower non-tech employees across the business to feel a willingness to understand, engage in and report security issues, thus embedding a positive security culture?
  • What is the role of employee awareness training in achieving this positive culture?
  • How can you champion the human aspect of security at every stage of your strategy?
  • Where is the tradeoff between security and end user experience and how will finding the right balance help your efforts to reduce non-malicious insider threat within your organisation?
Roundtable Track 4
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Addressing the technical skills gap and championing diversity in the security industry
headshot of Nuno Teodoro
Nuno Teodoro
Global CISO - Truphone
  • In the face of an increasingly challenging learning landscape due to the sheer pace of change in IT, how do we overcome a lack of skills in relation to emerging tech, e.g. in 5G or AI/ML and security?
  • What is the role of automation in overcoming the resulting lack of technical skills?
  • How can the security skills gap be solved by greater diversity in the industry?
  • What changes need to be made to make the industry a more accessible place for women, neurodiverse individuals and other underrepresented groups?
Roundtable Track 5
Session 1 - Challenges
3:15pm - 4:15pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Ensuring compliance across jurisdictions with varying and often contrary privacy legislations
headshot of Thuyen Hong Cong PHAM
Thuyen Hong Cong PHAM
CISO - Groupe Barrière
  • How do you communicate the business-value of compliance in a way that does not contribute to the perception of security as a barrier to innovation?
  • In the face of changing data privacy regulations, e.g. CCPA and Brexit, what are the lessons learned from GDPR?
  • How can you take ownership of breaches, enabling collective defence while mitigating reputational damage and potentially strengthening perception of your brand?
  • What is the role of automation in not only preventing breaches but in managing compliance across jurisdictions?
Workshop Track 6
4:20pm - 5:00pm
Do you have your head in the cloud?
  • One of the fundamental strengths of the cloud is also one of its biggest weakness, namely that it extends access to data and applications for users and, with this, leads to an increased risk of breaches.
  • How do you ensure that you are properly managing your cloud security?
  • Do we need to rethink access management?
  • Has the password reached its sell by date and, if so, what is the role of multifactor authentication and biometrics in replacing it?
Workshop
5:05pm - 5:45pm
Scrap out of the box training programmes
  • With human error accounting for 90% of email breaches, for example, the need to raise awareness and deliver training alongside a positive security culture remains a pressing issue.
  • Let’s look at an example of a successful and, most importantly, innovative awareness campaign/training programme with a robust system for measuring success.
Attendee downtime
5:45pm - 6:00pm

Take a well-earned break before joining us for networking drinks.

Networking drinks
6:00pm - 7:00pm

A casual setting to network and meet the rest of the attendees and discuss relevant topics at your leisure.

Gala dinner​
7:30pm - 10:00pm

Join us for our Gala Dinner & Keynote Speaker. An opportunity to network with your peers in a social environment with a three course dinner and wine whilst listening to an industry leader discuss a key topic.

Keynote
8:00pm - 8:30pm
Our Keynote speaker will be addressing the entirety of Summit attendees during our Gala Dinner. They will be going beyond the 'brand story' and sharing their experience and the real truths of tackling a challenge that is shaping the industry.
The future of the industry: nurturing the next generation

Substantial growth within the cyber security industry means that we are now in a position where there will be 3.5 million unfilled cyber security job openings by 2021.

  • How can we rebrand the cyber security space to ensure that young talent see it as a viable career path?
  • What can businesses and governments do to encourage new and existing pools of talent to channel into the industry?
Tuesday May 12, 2020
Breakfast​
7:00am - 7:50am

Please come down and join us for breakfast and prepare for a day of workshops, keynotes, debates and panels.

Welcome remarks
7:50am - 8:00am

Our Master of Ceremonies will brief you into the day 2 program to make sure you are in the right place at the right time.

Panel Discussion
8:00am - 8:30am
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Positive security culture: a silver bullet?

Almost 90% of cyber security breaches occur as a result of human error. With increasing interest in cyber security over the past few years, awareness has never been higher, but we are yet to see a drastic change in behaviour or a reduction in non-malicious insider threat.

  • How can you engender a positive security culture across your organisation that encourages non-tech employees to ask questions, report incidents and engage in understanding threats?
Keynote
8:30am - 9:00am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
‘Playing chess with yourself’: thinking like a hacker

In order to truly understand your threat landscape, you need to be able to answer the question; ‘Are your critical assets secure?’ at any given moment.

  • What is the role of breach and attack simulation (BAS) platforms in providing this continuous intelligence?
Oxford Style Debate and Live Polling
9:00am - 9:40am
One Topic. Two experts. Two opinions. You'll get the chance to vote on where you stand before the session starts. We'll then hear from our two experts, to see if they can sway your opinion when you participate in the closing vote.
The role of the CISO will cease to exist in 10 years’ time
headshot of Ciara Feeney
Ciara Feeney
Group CISO - Athora Holding Ltd.
  • For: As security becomes increasingly integral to everything you do across your entire organisation, there will be no need for a function that is purely security-focused. The role will transform to focus more exclusively on compliance.
  • Against: You will always need a driving force behind your security function and if anything the role will become more and more integral to driving business interests.
Coffee and networking
9:40am - 10:00am

Take a break and refuel whilst networking and socialising with your peers.

Workshop
10:00am - 10:40am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Brexit: the cybersecurity and data protection implications
  • When (and if) Brexit happens, the EU and the UK will face complex cybersecurity challenges and must consider the impact of the direct and indirect implications it will have on current and future frameworks and governance around the transfer of personal data.
  • Moreover, the threat landscape will change and security approaches will need to be revised.
  • This session will offer an overview of the potential impact, problems and solutions posed by this shifting landscape of rules from both an IT and data protection perspective.

Juan Carlos Lopez Ruggiero is a global security executive with 20+ years of experience across multiple countries as a results-oriented CISO and advisor on ‘security and privacy by design’ for the European Union. He speaks fluent German, Swiss-German, English, French, Spanish, Italian, Catalan, Portuguese and has basic knowledge of Dutch and Russian.

Panel Discussion
10:45am - 11:25pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Mind the diversity gap: closing the security skills gap
  • Cybersecurity Ventures research suggests that there will be a global shortfall of skills to the tune of 3.5 million open cyber security jobs by 2021. Considering that women make up only 23% of STEM occupations, what are the difficulties women face in studying cyber security and in being a member of technical security teams?
  • How can you embrace the neurodiverse skillset to remedy a shortage of technical skills?
  • How will an increasingly diverse security team (gender, ethnicity, neurodiversity) not only close the skills gap but also lead to more innovation?
Keynote
11:30pm - 12:00pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Security automation to the rescue: overcoming a lack of technical skills
  • The absence of support for existing cyber security professionals is also preventing them from advancing their own skill sets, leaving them lagging behind attackers.
  • What is the role of automation in overcoming this challenge?
Networking lunch
12:00pm - 1:15pm

Join us for a sit-down lunch, and a chance to catch up on emails and get ready for the afternoon.

Roundtable
Session 2 - Discovery
1:15pm - 2:30pm
Learning and sharing with your group. What are the solutions? Are they readily available? What path are you going to take?
Drill down roundtables

Track 1: Securing an increasingly diverse and boundless environment

Track 2: Communicating the business impact of your security strategy and developing metrics to showcase this

Track 3: Embedding a positive security culture across your organisation

Track 4: Addressing the technical skills gap and championing diversity in the security industry

Track 5: Ensuring compliance across jurisdictions with varying and often contrary privacy legislations

Workshop
2:35pm - 3:15pm
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
The rise of partner ecosystems
  • As the sheer volume of vendors offering point solutions is leaving security leaders increasingly confused, how will the rise of partner ecosystems mitigate integration issues and transform the vendor-client relationship within the security space?
Panel Discussion
3:20pm - 4:00pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Building constructive vendor relationships in a fragmented landscape
headshot of Daniel May
Daniel May
UK Head of Information Security - EFG Private Bank Ltd
  • In security industry especially, a shortage of skills along with the nature of the game itself necessitates a third-party infrastructure if you want to secure your organisation and its assets.
  • However, when asked if they would recommend their providers, CISOs reported a Net Promoter Score of -31 (with 0 being neutral).
  • With nearly half of firms suffering breaches at the hands of vendors, how do you form a positive and informative relationship with your vendors that allows you to gain visibility on your security beyond your ecosystem?
Coffee and networking
4:00pm - 4:15pm

Take a break and refuel whilst networking and socialising with your peers.

Oxford Style Debate and Live Polling
4:15pm - 4:45pm
One Topic. Two experts. Two opinions. You'll get the chance to vote on where you stand before the session starts. We'll then hear from our two experts, to see if they can sway your opinion when you participate in the closing vote.
‘Degree in related field’ is killing the security industry
  • For: Even if you are not STEM educated, there are a number of personality traits (e.g. curiosity, willingness to fail) that will make you a good candidate for many roles in security. The corporate restriction of ‘degree in related field’ for security recruitment means that viable candidates are not applying for roles we desperately need to fill.
  • Against: Security leaders are overloaded and do not have the time or resources to train candidates without a basic level of skill. We should instead channel our efforts into working with higher education institutions to ensure programmes exist that train ‘emerging technical skills’ (cloud, 5G, AI/ML etc.)
Attendee downtime
4:45pm - 6:45pm

A needed break after a content filled day. Please use this time as you wish prior to joining us for our night two seated dinner.

Networking drinks
6:45pm - 7:30pm

A casual setting to network and meet the rest of the attendees and discuss relevant topics at your leisure.

Dinner and entertainment
7:30pm - 10:00pm

Join us for our night two Gala Dinner, which will be in a casual and inviting setting.

Wednesday May 13, 2020
Breakfast​​
7:00 am - 7:50 am

Please come down and join us for breakfast and prepare for a day of workshops, keynotes, debates and panels.

Welcome remarks
7:50 am - 8:00 am

Our Master of Ceremonies will brief you into the day 3 program to make sure you are in the right place at the right time.

Keynote
8:00 am - 8:30 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Turning weakness into strength: how to handle reputational damage following a breach

While GDPR has increased insight into the sheer number of breaches occurring on a daily basis, there is still a tendency for organisations to be demonised in the media following a breach, encouraging victims to cover up the incident and refrain from discussing it publicly. This is extremely damaging from a collective defence perspective and leads to missed opportunities for sharing, collaboration and prevention in the community.

  • How can you actually bolster your reputation following a breach by being honest, open and collaborative?
Workshop
8:35 am - 9:15 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Getting better at governance and compliance: lessons from GDPR

Data privacy regulations such as CCPA are signalling a paradigm shift around security regulations and many expect further state regulations to appear in the coming years.

  • How has the security function changed post-GDPR?
  • In the face of changing data privacy regulations, e.g. CCPA and Brexit, what are the lessons learned from GDPR?
  • How do you build a framework to regularly review your regulatory procedures in light of future regulations and jurisdictions for enterprises and vendors?
Workshop
9:20 am - 10:00 am
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Automating for compliance
  • With privacy legislations of varying severities appearing across the globe, how can we automate compliance to accommodate regulations across multiple jurisdictions?
Roundtable
Session 3 - Outcomes
10:05 am - 11:00 am
What does it all mean? Tracing back through two days of work, where are we? What are you bringing back to the office with you?
Drill down roundtables

Track 1: Securing an increasingly diverse and boundless environment

Track 2: Communicating the business impact of your security strategy and developing metrics to showcase this

Track 3: Embedding a positive security culture across your organisation

Track 4: Addressing the technical skills gap and championing diversity in the security industry

Track 5: Ensuring compliance across jurisdictions with varying and often contrary privacy legislations

Keynote
11:00 am - 11:30 pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Blockchain: beyond the buzzword
headshot of Allan Moutrey
Allan Moutrey
Chief Security Architect - Marsh & McLennan Companies, Inc.

The term ‘blockchain’ has become a notorious buzzword, but the realities of what the technology means for the security space is rarely discussed.

  • What is blockchain technology and how will it impact your organisation and society as a whole?
Buffet lunch
11:30 pm - 12:00 pm

Before you head home, make sure you grab something from our buffet-style lunch for your journey ahead.

Summit Location

Powerscourt Hotel Resort and Spa, Wicklow, Ireland

Our events take place at some of the most prestigious venues in the world. Five-star accommodation, dining and amenities make attending one of our summits both business and pleasure. Being productive has never been so much fun.

Popular content from our Summits

GDS Summits host experts to help experts. Our speakers are leading executives willing to share their insight to change the industry and the world in critical ways.

To discuss how GDS Summits can help you solve your project challenges contact us on: 0117 921 4000 or email sayhello@gdsgroup.com.

Sponsors & Partners

Media Partners

Join us at the Upcoming Event

Don't miss out

Apply now