

Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.
Connect with 70+ senior Security leaders for a curated agenda focused on tackling your current business critical challenges and driving industry forward. Our summits are designed to help you:
Build new connections with likeminded senior leaders
Stay current with emerging business trends
Understand the impact new technology can make
De-risk new projects by gaining a broad range of insights
Accelerate key projects through meaningful new partnerships
Downloadable and actionable takeaways
09:00 - 09:20
09:20 - 09:50
A Perspective on AI through a Cyber Security Lens
09:55 - 10:35
How to improve organisational learning after a cybersecurity incident?
What is the key lesson you’ve seen organisations learn from cybersecurity incidents?What opportunities do you see for organisations to improve how they learn from cybersecurity incidents?
10:35 - 10:45
Start left in software security with secure design
Designing a secure application from the start is far more cost effective than playing whack-a-mole with security vulnerabilities in production. We will explore simple techniques to get developers thinking about security at the design stage, before they start writing code.
10:45 - 11:45
Track 1: Going on the offensive in a democratised age
The world of Hybrid work and accessing global talent pools demand that ever more distributed workers are given access to key data and tools and demand their employers trust them in the process. At the same time different functions who are desperate to take control of their digital destinies to create better customer solutions faster. How can security leaders meet the future of Cyber war head on as organisations seek to build a culture of trust, democratisation and customer centric responsiveness.
Track 2: Preparing for the Security Savvy Board
Understanding locks, keys and cameras to protect critical infrastructure has always been easy for boards to appreciate and justify. Yet as security threats have moved further into the cyberspace and becoming increasingly complex it has been harder for boards to know how effective information security officers are being. That is all changing. After the pandemic boards are giving a mandate of organisational resilience and are looking to create a brand that drives effective security culture.
Track 3: The Challenges Around Securing Software Supply Chains
By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, requires organizations to take action to ensure the security and integrity of their software. But this is easier said than done. This roundtable explores the following key topics:•How the software supply chain is becoming more complex and a greater attack vector•Explore new challenges that this complexity is creating as well as new regulatory obstacles•Mitigation strategies throughout the software development processes and environment
11:50 - 12:20
Staying Secure in the Midst of a Talent Crisis
CrisisThe worldwide cyber talent shortage is real and growing. Just in the US, the Labor Department estimates 600,000 more openings than qualified professionals. Globally, the gap is 2.7 million. The lack of skilled practitioners is leaving vulnerabilities unpatched and organizations dangerously exposed. But effective and innovative solutions can bridge the talent gap and address both near term and longer term needs.
In this session, we’ll explore:•Current options to increase the cyber talent capacity required to meet organizations’ current and future security needs•Broadening the diversity of available security skill sets to cover the full scope of vulnerabilities for on-premise, cloud, networking, hosts, mobile, applications, etc•The challenges, and importance, of establishing a continuous testing practice to keep pace with the continuous application development and deployment methodologies•The advantages of leveraging crowdsourcing as part of your security operations.•The importance of standard testing frameworks and operational transparency in leveraging untapped and available security talent
12:20 - 12:30
Decentralising software security with security champions
Hiring enough application security experts to ensure that all software is built and deployed securely is an increasingly impossible task. The solution is to move the responsibility for security into the development teams themselves through security champions.
09:00 - 09:10
09:10 - 09:40
The Open Source Security Journey - from cynic to disciple
Open source is seen as a key catalyst of innovation and cost saving as organisations move towards democratised access to IT and citizen development. Realising the benefits of open source while staying safe is a complicated process and in this panel we will share view points from organisations that are at different stage of their journey.
09:45 - 10:25
How cloud threats in 2021 have evolved our security strategy
Join Nico from Wiz & Frank from 1600 Cyber as they review the most notable cloud threats in 2021 and how their key learnings impact cloud security strategy in 2022. Last year proved to be another year of massive disruption on many levels. For security teams the impact was even more profound as cloud risks grew more complicated. Looking back at the most notable ones, like Log4J, it becomes clear current approaches create more work than results.
10:25 - 10:35
The importance of resilience after a breach in today's threat landscape
As the volume, speed and sophistication of cyber threats increases against an expanding enterprise attack surface, 100% breach prevention is unrealistic.
10:35 - 11:35
Track 1: Going on the offensive in a democratised age
The world of Hybrid work and accessing global talent pools demand that ever more distributed workers are given access to key data and tools and demand their employers trust them in the process. At the same time different functions who are desperate to take control of their digital destinies to create better customer solutions faster. How can security leaders meet the future of Cyber war head on as organisations seek to build a culture of trust, democratisation and customer centric responsiveness.
Track 2: Preparing for the Security Savvy Board
Understanding locks, keys and cameras to protect critical infrastructure has always been easy for boards to appreciate and justify. Yet as security threats have moved further into the cyberspace and becoming increasingly complex it has been harder for boards to know how effective information security officers are being. That is all changing. After the pandemic boards are giving a mandate of organisational resilience and are looking to create a brand that drives effective security culture.
Track 3: The Challenges Around Securing Software Supply Chains
By 2025, 45% of organizations worldwide will have experienced attacks on their software supply chains (Gartner) which are only becoming increasingly complex due to the changes in how modern software is built. These trends, together with new federal regulations, requires organizations to take action to ensure the security and integrity of their software. But this is easier said than done. This roundtable explores the following key topics:•How the software supply chain is becoming more complex and a greater attack vector•Explore new challenges that this complexity is creating as well as new regulatory obstacles•Mitigation strategies throughout the software development processes and environment
11:40 - 12:20
In the Fight With You
Choosing technology is often about looking for a reliable technology partner. But, in IT Security you need more than that, you need a Partner that will join in the fight with you and turn any unfair fight into a fairer one.This keynote looks at how it’s vital to have Partner that not only helps you technically to even up the playing field between you and your adversaries - but offers some other key support that you should consider with any Partners you chose to be in the fight with you?
09:00 - 09:10
09:10 - 09:40
Can You Trust the Cloud with Your Sensitive Data?
Data is the lifeblood of any organization. However, many organizations have difficulty understanding where all of their sensitive data is located, and what additional protection and access controls they should implement, so that they remain compliant with relevant data privacy and data sovereignty regulations. The lack of clear solutions often means that sensitive and personally identifiable data remains on-premises, which increases operational cost, reduces data value and slows down the planned digital transformation.
In this keynote, we will cover:•Key challenges organizations typically face in trusting Hyperscalers with their sensitive data.•Highlight the importance of controlling digital sovereignty early on in the journey to cloud.•Show how adopting a Discover, Protect and Control methodology can help CISOs and DPOs leverage compliance as a business enabler and drive greater cloud adoption.•Share lessons learned from several customer success stories in which sensitive workload migrations were unblocked at various stages in the journey to cloud using a risk-based approach.
09:45 - 10:25
The Modern CISO’s API Security Strategy
In 2011 Venture Capitalist Marc Andreessen wrote his seminal WSJ article titled “Why Software Is Eating The World”, today it is clear that API are fueling that software and securing them is paramount. Successful digital transformation, increased multi-cloud adoption, automation, and policies and initiatives like Open Banking and Gaia-X have given rise to the general adoption of APIs in most enterprises. We must take appropriate steps to ensure we can continue to drive innovation securely.
10:25 - 10:35
Becoming resilient with a new breed of forensic technology
After a breach, blocking and monitoring solutions are ineffective. Only a new breed of forensics can provide the data visibility for effective resilience at scale.
10:35 - 11:35
11:40 - 12:10
The changing landscape of 3rd party risk
Every day, businesses experience cybersecurity incidents that can become disruptive, costly, and significantly damage their reputation. Large companies at the center of vast data ecosystems, however, face a particularly thorny problem: managing cyber and privacy risks around information that travels to third parties and beyond. This panel explores the shifting challenges from security leaders who work as clients and thrid party providers.
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
The ultimate live polling and gamification tools, keeping your audience engaged.
Enabling our team to help you control your session experience.
Interactive quizzes to gamify your session
Content and insight from industry experts when it matters most
There is no cost associated with attending a GDS Summit. In return, we ask that all senior executives in participation attend for the full duration to ensure that all attendees get maximum value and insight from the interactive roundtables, live Q&As and breakout networking sessions.
Our digital summit portfolio is designed to bring together senior decision makers from large global businesses and innovative disruptor brands to drive industry forward through addressing business critical challenges collaboratively.
If you’re keen to build new connections with likeminded leaders, de-risk your projects through new insight and establish new partnerships that can accelerate your projects then apply to attend today.
Complete our ‘apply to attend’ form on the event page if you’re interested in attending the summit and you meet our application criteria. A member of the GDS team will then reach out to run you through the programme and event format and discuss your participation.
On stage: co-host a panel discussion with a group of likeminded senior executives or host a solo keynote presentation. Both slots include elements of interactive audience Q&A
Off stage: become a roundtable moderator, leading the discussion with the same cohort of executives for the duration of the summit around a specific topic you’ve agreed to focus on during the roundtable session.
We can tailor a partnership package to help meet your business objectives. This might include brand awareness, driving traffic to your site or quality editorial content via exclusive interviews and Q&As with our executive audience. Enquire today for more information.
Still have a question contact us below
You will leave the summit with best practices to immediately apply back to your organisation and new connections from meaningful conversations.
If you haven’t been to a GDS Digital Summit, you will be incredibly impressed. It’s far more engaging than most digital event experiences. It’s a very interactive environment.
I connected with peers that I know I’ll stay in touch with, including suppliers which have presented a fantastic opportunity for 7-Eleven Global in the future. It may well be the most valuable summit I’ve attended in many years
Thank you so much! Great Summit - an outstanding 3 days that culminated in this Award ... I am humbled and honored. Congratulations to you all for pulling off a Hybrid Summit with Augmented Reality features that are truly unparalleled in the Industry! Collaborative, Interactive & showcasing leading edge technology ... GDS Summits really set the bar so high that a return to physical conferences might be re-evaluated in the Industry. You are an amazing Team of Professionals & I am truly honoured to have been a part of this Summit.