On 11-13 May 2020, the European edition of our Security Insight Summit will bring together senior security decision-makers and business leaders from across the continent to discuss the latest trends, emerging threats and new ways of thinking – and how best to make security work for your business.

The summit will focus on key topics such as adapting your security strategy to accommodate changes in IT consumption, effectively communicating the importance of security to business leaders, embedding a positive security culture, navigating a fragmented vendor landscape, overcoming the technical skills gap and perfecting compliance across multiple jurisdictions.

From case studies that lift the lid on operations inside best-in-class organisations, to workshops and collaborative sessions that focus on real challenges and future technology innovations, to one-to-one meetings with industry peers offering practical advice tailored to your specific needs, the summit provides you with everything you need to implement your key projects more effectively.

Our Approach

Every GDS Summit has one stated aim: to help attending executives implement their key projects more effectively. We do this by developing an in-depth understanding of those executives' project needs, the business outcomes they want to achieve, and the challenges they face in terms of hitting those goals.

Who Attends

Our summits are designed for executives looking to take their business to the next level – from market-leading brands to disruptive new entrants. As such, we’ve worked with some of the world’s best-loved and most forward-thinking businesses.
Apply to attend

Past Attendees

At previous events we've helped executives from some the world's most significant firms - as well as the most forward-thinking - to address their project challenges.
Image of Nick Lyngaae
Logo of Telia
Nick Lyngaae
CISO/Head of Security
Telia
Image of Stephane Nappo
Logo of Societe Generale
Stephane Nappo
Global CISO
Societe Generale
Image of Aernout Reijmer
Logo of ASML
Aernout Reijmer
CISO
ASML
Image of Niamh Muldoon
Logo of DocuSign
Niamh Muldoon
EU Information Security Director
DocuSign
Image of Achim Knebel
Logo of Siemens AG
Achim Knebel
CISO
Siemens AG
Image of Carlo Spada
Logo of Essilor
Carlo Spada
CISO
Essilor
Image of Mads Syska Hasling
Logo of Saxo Bank
Mads Syska Hasling
CISO
Saxo Bank
Image of Anwar Mirza
Logo of TNT
Anwar Mirza
Global Head of Data Governance
TNT
Image of Fotis Papazafeiropoulos
Logo of Coca-Cola Hellenic Bottling Company
Fotis Papazafeiropoulos
Group Cyber Security Director / CISO
Coca-Cola Hellenic Bottling Company
Image of Nuno Medeiros
Logo of EDP Distribuição
Nuno Medeiros
CISO
EDP Distribuição
Image of Claudio Paganelli
Logo of Gruppo Metaenergia
Claudio Paganelli
CIO & CISO
Gruppo Metaenergia
Image of Teemu Ylhaisi
Logo of OP Financial Group
Teemu Ylhaisi
CSO
OP Financial Group

6 Challenges in Security

Our summit is focused on solving your strategic challenges
  • Securing an increasingly diverse and boundless environment
  • Communicating the business impact of your security strategy and developing metrics to showcase this
  • Embedding a positive security culture across your organisation
  • Addressing the technical skills gap and championing diversity in the security industry
  • Negotiating the fragmented vendor landscape, overcoming lack of trust and mitigating third party risk
  • Ensuring compliance across jurisdictions with varying and often contrary privacy legislations
Apply to attend

Summit Schedule

Day 1
Day 2
Day 3
Monday May 11, 2020
Registration
1:00pm - 6:00pm

Join us at 1.00 pm when registration opens to collect your badge, check-in, meet the on-site team, and start your 2.5 day Summit experience.

Solution Provider Briefing
2:00pm - 2:30pm

Our VP of Sales will brief you on the next 2 ½ days at the summit, giving you all the information you’ll need for your 1-2-1 meetings, the networking sessions and what to expect to maximize your summit experience.

Welcome Remarks and Delegate Briefing
2:30pm - 2:45pm

Our Master of Ceremonies will kick off the Summit with a welcome brief and orientation session, giving you all the information you need to maximize your Summit experience.

Panel Discussion
2:45pm - 3:30pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Keynote Panel​: An enabler not a barrier: communicating the business value of security
  • According to this year’s ClubCISO InfoSec Maturity Report, only 27% of CISOs strongly agree that they feel as aligned with the business as they ought to be.
  • How do you change the perception of security as the ‘no’ function in the business and present it instead as an enabler?
  • How can you communicate your security strategy in a language that is accessible to traditional business leaders?
  • How do you build the business-facing value-creation capabilities of your team?
Interview
3:30pm - 3:50pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Diverse and disparate: defining your security environment
headshot of David Ferbrache OBE
David Ferbrache OBE
Global Head of Cyber Futures - KPMG
  • According to Gartner, more people are now accessing your network and applications from outside your organisation using remote, off prem devices than inside. This, along with the proliferation of connected devices and complex cloud systems, is making it increasingly difficult to understand where your data is, who has access to it and whether it’s secure.
  • How must our attitude to security change to reflect the way that we consume I.T?
  • How do you establish visibility over an increasingly diverse and boundless landscape?
Roundtable Track 1
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Securing an increasingly diverse and boundless environment
headshot of Giacomo Collini
Giacomo Collini
Director of Information Security - Hello Fresh
  • How can you adapt your security strategy to account for changes in how IT is being consumed, e.g. Bring Your Own Device (BYOD) culture, the proliferation of connected devices (IoT) and increasingly complex cloud systems?
  • With these changes leading to the disappearance of perimeters, how do you answer these key questions; Where is your data? Who has access to it? Is it secure?
  • If you can’t protect what you can’t see, how do you establish visibility over such an environment?
  • What is the role of automation in overcoming this challenge?
Roundtable Track 2
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Communicating the business impact of your security strategy and developing metrics to showcase this
headshot of David Shaw
David Shaw
Head of Information Security - Central Bank of Ireland
  • Is security perceived as a barrier to innovation in your organisation? How can you effectively communicate its importance in a language accessible to business leaders?
  • How do you tie your proposed actions – people, processes, technology – to risk against business-plan objectives?
  • How should we structure metrics to measure ROI on security projects, the success of CISOs and the value they bring?
  • How will the role of the CISO evolve over the next 5 – 10 years as security becomes a more and more holistic concern within organisations?
Roundtable Track 3
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Embedding a positive security culture across your organisation
  • How can you empower non-tech employees across the business to feel a willingness to understand, engage in and report security issues, thus embedding a positive security culture?
  • What is the role of employee awareness training in achieving this positive culture?
  • How can you champion the human aspect of security at every stage of your strategy?
  • Where is the tradeoff between security and end user experience and how will finding the right balance help your efforts to reduce non-malicious insider threat within your organisation?
Roundtable Track 4
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Addressing the technical skills gap and championing diversity in the security industry
  • In the face of an increasingly challenging learning landscape due to the sheer pace of change in IT, how do we overcome a lack of skills in relation to emerging tech, e.g. in 5G or AI/ML and security?
  • What is the role of automation in overcoming the resulting lack of technical skills?
  • How can the security skills gap be solved by greater diversity in the industry?
  • What changes need to be made to make the industry a more accessible place for women, neurodiverse individuals and other underrepresented groups?
Roundtable Track 5
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Negotiating the fragmented vendor landscape, overcoming lack of trust and mitigating third party risk
  • What is the best method of validating vendors and ‘finding the needle in the haystack’ in an increasingly buzzword-centric vendor environment?
  • How do you ensure there are no gaps in your security defences when working with multiple, often incompatible vendors focused on different areas?
  • How do you keep your vendor relationships as informative as possible, encourage transparency around security and facilitate the trust needed to gain a true understanding of your security beyond your ecosystem?
  • How will increasingly popular partner ecosystems that transcend traditional rivalries impact this landscape and transform these relationships?
Roundtable Track 6
Session 1 - Challenges
3:50pm - 5:00pm
It’s all about identifying your challenges. What are the key questions that keep you up at night? What solutions are you looking for? Find common ground.
Ensuring compliance across jurisdictions with varying and often contrary privacy legislations
  • How do you communicate the business-value of compliance in a way that does not contribute to the perception of security as a barrier to innovation?
  • In the face of changing data privacy regulations, e.g. CCPA and Brexit, what are the lessons learned from GDPR?
  • How can you take ownership of breaches, enabling collective defence while mitigating reputational damage and potentially strengthening perception of your brand?
  • What is the role of automation in not only preventing breaches but in managing compliance across jurisdictions?
Roundtable Feedback
5:00pm - 5:30pm

This is a show and tell with the entire delegation, lead by the roundtable moderators. Hear other challenges, perspectives, and topics that will set the tone for the Summit.

Networking Drinks
5:30pm - 7:00pm

A casual setting to network and meet the rest of the attendees and discuss relevant topics at your leisure.

Gala Dinner​
7:00pm - 10:00pm

Join us for our Gala Dinner & Keynote Speaker. An opportunity to network with your peers in a social environment with a three course dinner and wine whilst listening to an industry leader discuss a key topic.

Keynote
8:00pm - 8:30pm
Our Keynote speaker will be addressing the entirety of Summit attendees during our Gala Dinner. They will be going beyond the 'brand story' and sharing their experience and the real truths of tackling a challenge that is shaping the industry.
Gala Dinner Keynote, Q&A

Details To Follow.

Tuesday May 12, 2020
Breakfast​
7:00am - 7:50am

Please come down and join us for breakfast and prepare for a day of workshops, keynotes, debates and panels.

Welcome Remarks
7:50am - 8:00am

Our Master of Ceremonies will brief you into the day 2 program to make sure you are in the right place at the right time.

Panel Discussion
8:00am - 8:30am
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Keynote Panel: Positive security culture: a silver bullet?
  • Almost 90% of cyber security breaches occur as a result of human error.
  • With increasing interest in cyber security over the past few years, awareness has never been higher, but we are yet to see a drastic change in behaviour or a reduction in non-malicious insider threat.
  • How can you engender a positive security culture across your organisation that encourages non-tech employees to ask questions, report incidents and engage in understanding threats?
Keynote
8:30am - 9:00am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
‘Playing chess with yourself’: thinking like a hacker
  • In order to truly understand your threat landscape, you need to be able to answer the question; ‘Are your critical assets secure?’ at any given moment.
  • What is the role of breach and attack simulation (BAS) platforms in providing this continuous intelligence?
Keynote
9:00am - 9:20am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Measuring human risk
  • Dynamic vulnerabilities, such as misconfiguration and human error, are notoriously difficult to monitor.
  • How can your organisation measure human risk to develop a true understanding of its security landscape and in turn allow you to communicate ROI on employee awareness training to the Board?
  • How do you decide on the most effective training programs and champion the human aspect at every stage?
Oxford Style Debate and Live Polling
9:20am - 10:00am
One Topic. Two experts. Two opinions. You'll get the chance to vote on where you stand before the session starts. We'll then hear from our two experts, to see if they can sway your opinion when you participate in the closing vote.
"The role of the CISO will cease to exist in 10 years’ time"
headshot of Ciara Feeney
Ciara Feeney
Group CISO - Athora Holding Ltd.
  • For: As security becomes increasingly integral to everything you do across your entire organisation, there will be no need for a function that is purely security-focused. The role will transform to focus more exclusively on compliance.
  • Against: You will always need a driving force behind your security function and if anything the role will become more and more integral to driving business interests.
Coffee & Networking
10:00am - 10:15am

Take a break and refuel whilst networking and socializing with your peers.

Case Study
10:15am - 10:55am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Do you have your head in the cloud?
headshot of Juan Carlos Lopez Ruggiero
Juan Carlos Lopez Ruggiero
CSO and Chief Advisor on GDPR - European Commission
  • One of the fundamental strengths of the cloud is also one of its biggest weakness, namely that it extends access to data and applications for users and, with this, leads to an increased risk of breaches.
  • How do you ensure that you are properly managing your cloud security?
  • Do we need to rethink access management? Has the password reached its sell by date and, if so, what is the role of multifactor authentication and biometrics in replacing it?
Workshop
11:00am - 11:40am
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Scrap out of the box training programmes
  • With human error accounting for 90% of email breaches, for example, the need to raise awareness and deliver training alongside a positive security culture remains a pressing issue.
  • Let’s look at an example of a successful and, most importantly, innovative awareness campaign/training programme with a robust system for measuring success.
Panel Discussion
11:45am - 12:25pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Mind the diversity gap: closing the security skills gap
headshot of Eliza May Austin
Eliza May Austin
Founder - Ladies of London Hacking Society
  • Cybersecurity Ventures research suggests that there will be a global shortfall of skills to the tune of 3.5 million open cyber security jobs by 2021. Considering that women make up only 23% of STEM occupations, what are the difficulties women face in studying cyber security and in being a member of technical security teams?
  • How can you embrace the neurodiverse skillset to remedy a shortage of technical skills?
  • How will an increasingly diverse security team (gender, ethnicity, neurodiversity) not only close the skills gap but also lead to more innovation?
Keynote
12:30pm - 1:00pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Security automation to the rescue: overcoming a lack of technical skills
  • The absence of support for existing cyber security professionals is also preventing them from advancing their own skill sets, leaving them lagging behind attackers.
  • What is the role of automation in overcoming this challenge?
Networking Lunch
1:05pm - 1:45pm

Join us for a sit-down lunch, and a chance to catch up on emails and get ready for the afternoon.

Roundtable
Session 2 - Discovery
1:50pm - 2:30pm
Learning and sharing with your group. What are the solutions? Are they readily available? What path are you going to take?
Drill Down Roundtables

Track 1: Securing an increasingly diverse and boundless environment

Track 2: Communicating the business impact of your security strategy and developing metrics to showcase this

Track 3: Embedding a positive security culture across your organisation

Track 4: Addressing the technical skills gap and championing diversity in the security industry

Track 5: Negotiating the fragmented vendor landscape, overcoming lack of trust and mitigating third party risk

Track 6: Ensuring compliance across jurisdictions with varying and often contrary privacy legislations

Workshop
2:35pm - 3:15pm
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
The rise of partner ecosystems
  • As the sheer volume of vendors offering point solutions is leaving security leaders increasingly confused, how will the rise of partner ecosystems mitigate integration issues and transform the vendor-client relationship within the security space?
Case Study
3:20pm - 4:00pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Validating vendors: building a robust model
  • With nearly half of all companies experiencing data breaches at the hands of vendors, how can you build a robust, foolproof model for validating vendors?
  • To what extent does this robust model necessitate a more holistic approach to security across all functions within your organisation?
Panel Discussion
4:05pm - 4:45pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Building constructive vendor relationships in a fragmented landscape
headshot of Daniel May
Daniel May
Head of Information Security - EFG Private Bank
  • In security industry especially, a shortage of skills along with the nature of the game itself necessitates a third-party infrastructure if you want to secure your organisation and its assets.
  • However, when asked if they would recommend their providers, CISOs reported a Net Promoter Score of -31 (with 0 being neutral).
  • With nearly half of firms suffering breaches at the hands of vendors, how do you form a positive and informative relationship with your vendors that allows you to gain visibility on your security beyond your ecosystem?
Oxford Style Debate and Live Polling
4:50pm - 5:30pm
One Topic. Two experts. Two opinions. You'll get the chance to vote on where you stand before the session starts. We'll then hear from our two experts, to see if they can sway your opinion when you participate in the closing vote.
"We may want diversity but we cannot wait for diversity"
  • For: While the benefits of a diverse security team in the face of increasingly diverse challenges are clear, there simply aren’t enough candidates from more diverse backgrounds and organisations are desperate to fill technical security roles wherever they can.
  • Against: It is currently too challenging for people from more diverse backgrounds to enter into the security space and this will never change if we do not try harder to change the culture within our teams and the industry as a whole.
Attendee Downtime
5:30pm - 7:00pm

A needed break after a content filled day. Please use this time as you wish prior to joining us for our night 2 seated dinner.

Networking Drinks
7:00pm - 7:30pm

A casual setting to network and meet the rest of the attendees and discuss relevant topics at your leisure.

Dinner and Entertainment
7:30pm - 10:00pm

Join us for our night two Gala Dinner, which will be in a casual and inviting setting.

Wednesday May 13, 2020
Breakfast​​
7:30 am - 8:20 am

Please come down and join us for breakfast and prepare for a day of workshops, keynotes, debates and panels.

Welcome Remarks
8:20 am - 8:30 am

Our Master of Ceremonies will brief you into the day 3 program to make sure you are in the right place at the right time.

Keynote
8:30 am - 8:50 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Turning weakness into strength: how to handle reputational damage following a breach
  • While GDPR has increased insight into the sheer number of breaches occurring on a daily basis, there is still a tendency for organisations to be demonised in the media following a breach, encouraging victims to cover up the incident and refrain from discussing it publicly.
  • This is extremely damaging from a collective defence perspective and leads to missed opportunities for sharing, collaboration and prevention in the community.
  • How can you actually bolster your reputation following a breach by being honest, open and collaborative?
Keynote
8:55 am - 9:25 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
A brave new world: rebuilding trust and championing cooperation
  • The threat posed by cyber attacks is now so substantial that we need transcend the traditional rivalries between vendors and break down barriers to trust between clients and solution providers.
  • How can we work together to revolutionise the security vendor landscape and focus primarily on securing assets and people, rather than revenue?
Coffee & Networking Break
9:25 am - 9:40 am

Take a break and refuel whilst networking and socializing with your peers.

Case Study
9:40 am - 10:20 am
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Getting better at governance and compliance: lessons from GDPR
  • How has the security function changed post-GDPR?
  • In the face of changing data privacy regulations, e.g. CCPA and Brexit, what are the lessons learned from GDPR?
  • How do you build a framework to regularly review your regulatory procedures in light of future regulations and jurisdictions for enterprises and vendors?
Workshop
10:25 am - 11:05 am
An industry expert will lead an interactive workshop tackling common challenges and scenarios, engaging the audience to confront the issues and discuss ideas. What will your proposed solutions be?
Automating for compliance
  • With privacy legislations of varying severities appearing across the globe, how can we automate compliance to accommodate regulations across multiple jurisdictions?
Roundtable
Session 3 - Outcomes
11:10 am - 11:55 am
What does it all mean. Tracing back through two days of work, where are we? What you are bringing back to the office with you.
Drill Down Roundtables

Track 1: Securing an increasingly diverse and boundless environment

Track 2: Communicating the business impact of your security strategy and developing metrics to showcase this

Track 3: Embedding a positive security culture across your organisation

Track 4: Addressing the technical skills gap and championing diversity in the security industry

Track 5: Negotiating the fragmented vendor landscape, overcoming lack of trust and mitigating third party risk

Track 6: Ensuring compliance across jurisdictions with varying and often contrary privacy legislations

Keynote
12:00 am - 12:30 pm
A brand exec takes you behind the scenes, providing insight into a successful project implementation – what worked, what didn’t and which pitfalls to avoid.
Closing Keynote

Details To Follow.

Panel Discussion
12:30 pm - 1:10 pm
The perspectives of 4-5 industry experts into one of the key challenges we're all facing today. This will be moderated to create a session of different perspectives, opinions and tangible takeaways of how our panelists are tackling them.
Closing Panel & Wrap Up
headshot of Giacomo Collini
Giacomo Collini
Director of Information Security - Hello Fresh
headshot of David Shaw
David Shaw
Head of Information Security - Central Bank of Ireland
  • Moderators for each roundtable come together to present the conclusions of their meetings throughout the summit.
  • What have we learned and what will we take back to the office?
Buffet Lunch
12:30 pm - 1:30 pm

Before you head home, make sure you grab something from our buffet-style lunch for your journey ahead.

Summit Location

Powerscourt Hotel Resort and Spa, Wicklow, Ireland

Our events take place at some of the most prestigious venues in the world. Five-star accommodation, dining and amenities make attending one of our summits both business and pleasure. Being productive has never been so much fun.

Popular content from our Summits

GDS Summits host experts to help experts. Our speakers are leading executives willing to share their insight to change the industry and the world in critical ways.

To discuss how GDS Summits can help you solve your project challenges contact us on: 0117 921 4000 or email sayhello@gdsgroup.com.

Sponsors & Partners

Media Partners

Join us at the Upcoming Event

Don't miss out

Apply now