Security Digital Summit
Security leaders are having to be more proactive in meeting the growing complexity of the Cyber threat which means more compliance, risk management and protection. Yet as the pandemic is waning, organisations and functions are trying to open up and be more responsive to client needs in an increasingly democratised age, Security leaders will have to strike a careful balance.
Event Agenda
9:00 am - 9:15 am
Opening Remarks
Intro & Diamond Commentary
9:15 am - 9:45 am
Keynote
Collaboration helps close doors to cyberattacks
How teamwork combats generative AI and third-party cyberattacks while strengthening cyber resilience.
Widespread collaboration across internal security, technology, and business departments, as well as externally among organizations spanning a wide range of industries, is now more crucial than ever for helping to close doors to cyberattacks. To kick off the GDS Security Digital Summit, Upendra Mardikar, TIAA’s chief information security officer, will share insights on the importance of collaborating as one synchronized team to address three major industry challenges including:
• Avoiding generative AI cyberattacks.
• Preventing third party supply chain attacks.
• Strengthening cybersecurity resilience.
9:45 am - 10:25 am
Panel Discussion
Breaking barriers: Harnessing innovation to combat third-party security risks
Forrester Research believes that 60% of security incidents this year will result from issues with third parties, with many of these risks being identified after initial onboarding. As with any cyber security incident, they are not only costly and disruptive, but can cause considerable damage to businesses reputation.
This highlights the need for organizations to act to ensure the security and integrity of their partner ecosystem. And, as these ecosystems become more diverse and dynamic, organizations must continue to innovate ways of monitoring and collaborating with these critical business partners. Join leaders from a variety of organizations and industries as they discuss their journey and the challenges, they face working with 3rd party providers.
10:25 am - 10:35 am
Insight Break
10:35 am - 11:25 am
Roundtables
Track 1: Defending the digital frontier: Exploring the impact of AI and ML on cybersecurity
Sponsor:
As technology continues to advance at an unprecedented pace, cyber security leaders are faced with the daunting task of safeguarding their organizations' digital assets and infrastructure. In 2023, although it is only Summer, the impact of emerging technologies including artificial intelligence/machine learning, 5G, IoT, and quantum are significantly impacting everything connected to the internet.
The introduction of these potentially disruptive technologies has huge implications on cybersecurity. By examining the challenges and opportunities presented by these technologies, participants will gain insights into developing effective strategies to ensure robust security measures in this rapidly evolving digital age.
Join this roundtable to discuss the following points:
• How can AI and ML enhance cybersecurity practices, such as threat detection, anomaly detection, and incident response?
• What are the potential risks associated with AI and ML in cybersecurity, including adversarial attacks and biased algorithms?
• How can organizations strike a balance between leveraging AI and ML for enhanced security while addressing privacy concerns?
• How can organizations leverage the synergies between emerging technologies to strengthen their overall cybersecurity posture?
• What are the challenges in integrating AI, ML, 5G, IoT, and quantum technologies within existing cybersecurity frameworks?
• What are the ethical considerations surrounding the use of emerging technologies in cybersecurity, and how can organizations address them?
Track 2: Bridging the gap: Addressing the skills shortage threatening cloud security
The concept of digital transformation has been with us for a decade now, and it has become the driving force behind the IT efforts of most enterprises and always involves multicloud deployments. In fact, 71% of respondents to a recent IBM survey agreed that it is “difficult to realize the full potential of a digital transformation” without a multicloud strategy. At the same time, 41% of the executives do not think their security initiatives have kept up with digital transformation.
One of the primary roadblocks to implementing a strong cloud security posture is the fact that each major public cloud platform uses a different approach and tools for protecting its infrastructure. For example, AWS, Azure and GCP do not handle basic security functions such as identity and access management (IAM), privileged access management and VPNs in the same way. There are nuances that must be considered for security measures to work properly. The professionals who understand these nuances are not easy to find. Is this where the talent crunch meets the budget crunch? There are few organizations that are not suffering from a lack of skilled security personnel, and the competition for talent is intense. Whilst corporations tighten their purse strings and talent is scarce how can cloud providers better collaborate with their customers during this challenging landscape?
Join this roundtable to discuss the following points:
• How would you describe the current state of the skills shortage in cloud security? What are the specific challenges organizations face in finding and retaining skilled professionals?
• What are the key skills and expertise required to effectively manage cloud security? Are there any emerging areas or specialized roles that are becoming increasingly critical?
• What role can automation, artificial intelligence, and machine learning play in mitigating the skills shortage? How can these technologies enhance the capabilities of security teams and streamline cloud security operations?
• Looking to the future, what trends and technologies should organizations consider when developing their cloud security strategies? How can they prepare for the evolving threat landscape and the changing skill requirements?
• In the context of the skills shortage, how can organizations effectively balance outsourcing or partnering with third-party providers while maintaining control and ensuring the security of their cloud environments?
• Are there any regulatory or compliance considerations that must be considered when addressing the skills shortage in cloud security? How can organizations meet these requirements effectively?
• During a skills shortage shared responsibility has never been more prevalent, so how can cloud providers support businesses to navigate the complexities of cloud security, foster a proactive and cooperative approach to mitigate risks effectively?
Track 3: Cyber resilience: Strengthening governance, risk, and compliance practices against cyber threats
While governance, risk, and compliance were once seen as the organization's police - reacting to violations, misconduct, or other wrongdoing- that is no longer the case. Without a robust GRC framework that includes ESG, resiliency and strong cyber and compliance programs, there is a serious risk to a company’s reputation and its ability to attract and retain the best talent and customers. A well-planned GRC strategy comes with lots of benefits: improved decision-making, more optimal IT investments, elimination of silos, and reduced fragmentation among divisions and departments, to name a few.
The stakes have been raised and there are no more excuses. The uncertainties and challenges faced by organizations will only escalate with ongoing technological advancements, a volatile economic and geopolitical landscape, mounting regulations, evolving environmental and social factors, and more.
Join this roundtable to discuss the following questions:
• How can organizations establish a comprehensive GRC framework that incorporates cyber resilience as a critical component?
• What are the key elements of an effective cyber resilience strategy, and how can they be integrated into existing governance, risk, and compliance practices?
• Considering evolving environmental and social factors, how can cyber resilience efforts be aligned with environmental sustainability and corporate social responsibility goals?
• What are the potential consequences for organizations that fail to prioritize cyber resilience within their GRC practices, particularly in terms of reputation, talent acquisition, and customer trust?
• How can cyber resilience initiatives be effectively communicated to stakeholders, including the board of directors, senior management, employees, and customers?
• What role should the C-suite play in driving cyber resilience and strengthening governance, risk, and compliance practices within an organization?
• With ongoing technological advancements, how can organizations ensure that their cyber resilience strategies remain adaptable and responsive to emerging cyber threats?
• What are the challenges and opportunities associated with incorporating cyber resilience into the governance, risk, and compliance practices of multinational organizations with diverse regulatory environments?
• How can organizations effectively collaborate with external stakeholders, such as government agencies, industry associations, and cybersecurity vendors, to enhance cyber resilience and address common challenges?
• What metrics and key performance indicators (KPIs) should organizations use to measure the effectiveness of their cyber resilience efforts and the overall strength of their GRC practices?
11:25 am - 11:30 am
Short Break
11:30 am - 12:00 pm
Masterclass Breakouts
Personal information: Data masking/anonymization from document to IoT
The introduction of GDPR has highlighted concerns about keeping personal data safe, and how some tech giants have built business models based on our likes and dislikes. Anonymization/Data Masking has become a need for organizations seeking to stay compliant and those in charge of ethical monetization.
Manuel will review the impact of the various privacy laws and regulations, use cases, available technology, and the growing concern about our personal data being shared with the advent of increasingly more IoT devices and 5G/mobility.
12:01 pm - 12:31 pm
Headline Keynote
Enable resilient security posture with strategic security testing.
Most security testing today is purely tactical. We find vulnerabilities and sometimes fix them. We use this process to satisfy compliance requirements and report a point-in-time status to regulators, but we rarely learn anything about our overall security posture and use that information to change our strategy and priorities. Strategic, transformational security testing is the solution to a more resilient posture in today's threat landscape.
Strategic security testing uses aggregated data from individual penetration tests to reveal the root cause of persistent weaknesses in security posture due to broken processes and overwhelmed staff. Security and IT management can use that data to invest in training and solutions that are specifically targeted at organizational deficiencies. Moreover, a strategic security testing program will track improvements in overall security posture over time so those improvements can be communicated to senior leadership and the board.
9:00 am - 9:15 am
Opening Remarks
9:15 am - 9:45 am
Keynote
The human firewall: Nurturing a cybersecurity culture for the future
In this keynote, we explore the vital role of individuals in safeguarding our digital landscape. As cyber threats continue to evolve, technology alone cannot provide fool proof protection. It is the human firewall that becomes paramount.
During this session we will hear from Chris Lockery, CISO, Help at Home and learn how organizations can foster a cybersecurity culture that empowers employees to become the first line of defense. Uncover strategies to cultivate awareness, develop best practices, and build resilience in the face of ever-evolving threats.
9:47 am - 10:27 am
Panel Discussion
Leadership innovation: Recruit, retain and develop diverse IT security talent
Organizations are rapidly realizing the benefits of a diverse workforce. Despite their best efforts to attract a range of talent, many CISOs and other IT security leaders are concerned that they are failing to meet even their basic staffing goals. Why? In this panel session, we will explore best practices that will attract and retain the right candidates.
10:27 am - 10:37 am
Insight Break
10:40 am - 11:30 am
Roundtables
Track 1: Defending the digital frontier: Exploring the impact of AI and ML on cybersecurity
Sponsor:
As technology continues to advance at an unprecedented pace, cyber security leaders are faced with the daunting task of safeguarding their organizations' digital assets and infrastructure. In 2023, although it is only Summer, the impact of emerging technologies including artificial intelligence/machine learning, 5G, IoT, and quantum are significantly impacting everything connected to the internet.
The introduction of these potentially disruptive technologies has huge implications on cybersecurity. By examining the challenges and opportunities presented by these technologies, participants will gain insights into developing effective strategies to ensure robust security measures in this rapidly evolving digital age.
Join this roundtable to discuss the following points:
• How can AI and ML enhance cybersecurity practices, such as threat detection, anomaly detection, and incident response?
• What are the potential risks associated with AI and ML in cybersecurity, including adversarial attacks and biased algorithms?
• How can organizations strike a balance between leveraging AI and ML for enhanced security while addressing privacy concerns?
• How can organizations leverage the synergies between emerging technologies to strengthen their overall cybersecurity posture?
• What are the challenges in integrating AI, ML, 5G, IoT, and quantum technologies within existing cybersecurity frameworks?
• What are the ethical considerations surrounding the use of emerging technologies in cybersecurity, and how can organizations address them?
Track 2: Bridging the gap: Addressing the skills shortage threatening cloud security
The concept of digital transformation has been with us for a decade now, and it has become the driving force behind the IT efforts of most enterprises and always involves multicloud deployments. In fact, 71% of respondents to a recent IBM survey agreed that it is “difficult to realize the full potential of a digital transformation” without a multicloud strategy. At the same time, 41% of the executives do not think their security initiatives have kept up with digital transformation.
One of the primary roadblocks to implementing a strong cloud security posture is the fact that each major public cloud platform uses a different approach and tools for protecting its infrastructure. For example, AWS, Azure and GCP do not handle basic security functions such as identity and access management (IAM), privileged access management and VPNs in the same way. There are nuances that must be considered for security measures to work properly. The professionals who understand these nuances are not easy to find. Is this where the talent crunch meets the budget crunch? There are few organizations that are not suffering from a lack of skilled security personnel, and the competition for talent is intense. Whilst corporations tighten their purse strings and talent is scarce how can cloud providers better collaborate with their customers during this challenging landscape?
Join this roundtable to discuss the following points:
• How would you describe the current state of the skills shortage in cloud security? What are the specific challenges organizations face in finding and retaining skilled professionals?
• What are the key skills and expertise required to effectively manage cloud security? Are there any emerging areas or specialized roles that are becoming increasingly critical?
• What role can automation, artificial intelligence, and machine learning play in mitigating the skills shortage? How can these technologies enhance the capabilities of security teams and streamline cloud security operations?
• Looking to the future, what trends and technologies should organizations consider when developing their cloud security strategies? How can they prepare for the evolving threat landscape and the changing skill requirements?
• In the context of the skills shortage, how can organizations effectively balance outsourcing or partnering with third-party providers while maintaining control and ensuring the security of their cloud environments?
• Are there any regulatory or compliance considerations that must be considered when addressing the skills shortage in cloud security? How can organizations meet these requirements effectively?
• During a skills shortage shared responsibility has never been more prevalent, so how can cloud providers support businesses to navigate the complexities of cloud security, foster a proactive and cooperative approach to mitigate risks effectively?
Track 3: Cyber resilience: Strengthening governance, risk, and compliance practices against cyber threats
While governance, risk, and compliance were once seen as the organization's police - reacting to violations, misconduct, or other wrongdoing- that is no longer the case. Without a robust GRC framework that includes ESG, resiliency and strong cyber and compliance programs, there is a serious risk to a company’s reputation and its ability to attract and retain the best talent and customers. A well-planned GRC strategy comes with lots of benefits: improved decision-making, more optimal IT investments, elimination of silos, and reduced fragmentation among divisions and departments, to name a few.
The stakes have been raised and there are no more excuses. The uncertainties and challenges faced by organizations will only escalate with ongoing technological advancements, a volatile economic and geopolitical landscape, mounting regulations, evolving environmental and social factors, and more.
Join this roundtable to discuss the following questions:
• How can organizations establish a comprehensive GRC framework that incorporates cyber resilience as a critical component?
• What are the key elements of an effective cyber resilience strategy, and how can they be integrated into existing governance, risk, and compliance practices?
• Considering evolving environmental and social factors, how can cyber resilience efforts be aligned with environmental sustainability and corporate social responsibility goals?
• What are the potential consequences for organizations that fail to prioritize cyber resilience within their GRC practices, particularly in terms of reputation, talent acquisition, and customer trust?
• How can cyber resilience initiatives be effectively communicated to stakeholders, including the board of directors, senior management, employees, and customers?
• What role should the C-suite play in driving cyber resilience and strengthening governance, risk, and compliance practices within an organization?
• With ongoing technological advancements, how can organizations ensure that their cyber resilience strategies remain adaptable and responsive to emerging cyber threats?
• What are the challenges and opportunities associated with incorporating cyber resilience into the governance, risk, and compliance practices of multinational organizations with diverse regulatory environments?
• How can organizations effectively collaborate with external stakeholders, such as government agencies, industry associations, and cybersecurity vendors, to enhance cyber resilience and address common challenges?
• What metrics and key performance indicators (KPIs) should organizations use to measure the effectiveness of their cyber resilience efforts and the overall strength of their GRC practices?
11:31 am - 12:01 pm
Innovation Exchange Keynote
Mastering the craft: Secrets to growing exceptional security professionals
Gain a deeper understanding of the key traits and competencies that define exceptional security professionals and how to foster their growth within your organization.
From mentoring programs to training initiatives, explore practical approaches that can unlock the potential of security professionals and equip them with the knowledge and skills they need to navigate the ever-evolving cybersecurity landscape. Jay Wiley, Deputy CISO from M&T Bank will share success stories that highlight the transformative impact of investing in talent development.
12:03 pm - 12:33 pm
Closing Prime Keynote
Securing the Digital Supply Chain in an insecure world: Best practices to increase TPRM efficiencies while reducing risk
This session is tailored to provide you with valuable tips and techniques that will empower you to strengthen your organization's overall security posture through a best in class third party risk management program.
In this highly anticipated keynote session, the esteemed Vanessa Jankowski, SVP & General Manager, TPRM at Bitsight, will unveil the strategies, tips, and techniques necessary to build or enhance A third-party cyber risk management program that allows you to keep up with a cyber landscape that is more challenging than ever, and an economic environment that is asking cybersecurity and risk leaders to do more with less.
Keynote Highlights:
• Capitalize on intelligence, automation, and community to do more with less: Apply best practices and capabilities designed to help you scale across your entire third-party portfolio while rationalizing vendor sprawl and limited budget.
• Harness the power of intelligence to scale your third-party risk management efforts: Learn how objective evidence and analytics can give you a roadmap to effective discovery and prioritization of third-party cyber risk. Stay ahead of emerging threats with real-time insights.
• Leverage the network effect for measurable risk reduction: Identify strategies to engage with third-party vendors that foster collaboration and lead to measurable risk reduction. Establish a framework for effective cybersecurity partnerships.
• Automate to scale: Identify opportunities to automate key playbooks and workflows in third party risk management to keep up with the demands of the business, the economic environment, and the cyber risk landscape.
9:00 am - 9:15 am
Opening Remarks
9:15 am - 9:45 am
Keynote
Navigating the privacy revolution: Anticipating the impact of evolving regulations
In an era of rapid business transformation, companies across industries are bracing themselves for a wave of new and evolving privacy regulations that will redefine the landscape of data management and customer interactions. Join us to hear Davin Darnt, CISO, Louis Vuitton North America for an insightful session that explores the profound implications of these impending regulations and sheds light on the steps organizations must take to adapt, comply, and remain competitive.
9:46 am - 10:26 am
Panel Discussion
The future of cybersecurity amid digital transformation
Reliable and resilient digital transformation can only be achieved when it has a foundation of cybersecurity beneath it. CIOs and CTOs often transform business solutions to enable the business using tools such as artificial intelligence (AI) and Internet of Things (IoT). But with these tools comes new or increased cybersecurity and technology risks.
By sidestepping cybersecurity in a rush to digitalize, organizations, employees and their customers are left exposed. Digital transformation without cybersecurity is a recipe for disaster so how can security leaders go about deciding the most effective path forward?
10:27 am - 10:37 am
Insight Break
Best of breed vs platform cybersecurity?
Facts, Figures, and Considerations........
10:37 am - 11:32 am
Roundtable Leaders Panel
11:35 am - 12:05 pm
Innovation Exchange Keynote
Preparing for cybersecurity expertise on boards: Building the foundation for future opportunities
With the recent SEC proposal enforcing the inclusion of cybersecurity expertise on boards, a surge in demand for CISOs joining public company boards has emerged. This trend is expected to extend to private companies and non-profit organizations.
Andrew Wilder, Adjunct Professor of Cybersecurity at Washington University will delve into the implications of this proposal and explore the growing demand for CISOs in boardroom positions. Also examining the benefits that cybersecurity expertise brings to boards, including informed decision-making, robust risk management, and effective incident response capabilities. Not a session to be missed!
11:35 am - 12:05 pm
MOC Closing
Why Attend
New connections
Build new connections with likeminded senior leaders
Business trends
Stay current with emerging business trends
Key takeaways
Downloadable and actionable takeaways
New partnerships
Accelerate key projects through meaningful new partnerships
Insights
De-risk new projects by gaining a broad range of insights
New technologies
Understand the impact new technology can make
An immersive
Digital Summit
interactive features including:
Audience Interaction
Engage with a virtual live audience just as you would at a physical event and create meaningful conversations.
Interactive Live Polling
Keep engaged through interactive live polling and gamification tools.
Direct connections
Ask your questions face-to-face with the speakers via our leading stage technology.
Relationship building
Build stronger connections with leading executives that you will take with you through your career
Thought Leadership
Content and insight from industry experts when it matters most
Intelligent interaction
Interactive quizzes gamify your experience
Apply to attend
Meet with fellow industry leaders and solve today’s greatest business challenges.
Thank you for your interest. One of the team will be in touch soon.
Frequently asked questions
A Digital Summit from GDS Group is a 3-day event experience bringing multiple partners and senior decision makers together. Within this immersive enviroment they discover new technical solutions, share learning opportunities and discuss trending industry topics which boosts insight, conversation and connections.
There are a couple of ways you can participate in a GDS event experience; as a partner or as an attendee. Whichever you are interested in, do get in touch.
Global senior decision makers from leading industry brands attend our event experiences. Between 2020 to May 2023, 34,473 senior executives attended our event experiences. If you are interested in attending a GDS event experience, please check out our upcoming events.
At one of our GDS Digital Summits there are several speaking slot packages available for you – 2x power insights commentator slots, keynote panel seats, masterclass hosting, prime keynote slot, and headline keynote slot.
Get in touch with us to learn more.
Yes! We partner with leading brands all across the globe – for partnership opportunities please get in touch.