2017
Global Cyber security Summit 2017 (GCS17)
Kyiv, Ukraine, Congress and exhibition center "The Park"
Details
days hours minutes seconds
buy ticket
/
55 DOZENS OF FEATUREd SPEAKERS
Antony Blinken
Antony Blinken
  • Former U.S. Deputy Secretary of State
  • Former Deputy National Security Advisor
read more
Joel Benavides
Joel Benavides
  • Sr. Director Global Legal & Advocacy at Box, Inc.
read more
Victor Gevers
Victor Gevers
  • Innovation Manager in the Dutch government Chairman and Co-Founder or GDI Foundation
read more
Nathaniel Gleicher
Nathaniel Gleicher
  • Head of Cybersecurity Strategy at Illumio
  • Former Director for Cybersecurity Policy at the U.S. National Security Council
read more
Dan Keyserling
Dan Keyserling
  • Head of Communications and a Senior Advisor at Jigsaw, Alphabet’s Incubator
read more
Karl Holmqvist
Karl Holmqvist
  • CEO & Founder of Lastwall
read more
Christopher Kirchhoff
Christopher Kirchhoff
  • Partner at Defense Innovation Unit X - Pentagon's Silicon Valley Office
  • Former Director for Strategic Planning at the U.S. National Security Council
read more
Michael McNerney
Michael McNerney
  • Co-Founder & CEO of Efflux Systems
read more
Monzy Merza
Monzy Merza
  • Head of Security Research at Splunk, Inc.
read more
Dr. Gregory Michaelidis
Dr. Gregory Michaelidis
  • Founder & Director of Security Awareness Lab LLC
read more
Matt Olsen
Matt Olsen
  • Co-Founder & President of IronNet Cybersecurity
  • Former Director of the U.S. National Counterterrorism Center
  • Former General Counsel of the U.S. National Security Agency
read more
Dr. Michael C. Owens
Dr. Michael C. Owens
  • Global Program Director for Cybersecurity and Cybercrime at EY
read more
Eric Rosenbach
Eric Rosenbach
  • Former Chief of Staff at the U.S. Department of Defense
  • Former Assistant Secretary of Defense for Global Security
  • Former Deputy Assistant Secretary of Defense for Cybersecurity
read more
Suzanne Spaulding
Suzanne Spaulding
  • Former Under Secretary for National Protection and Programs Directorate at the U.S. Department of Homeland Security
read more
Bill Wright
Bill Wright
  • Director, Government Affairs & Senior Policy Counsel with Symantec
read more
Dan Swislow
Dan Swislow
  • Silicon Valley Representative at the National Democratic Institute
read more
Thomas Varghese
Thomas Varghese
  • Cybersecurity Angel Investor
  • Former VP of Identity Management and Security at Oracle
read more
The Global Cybersecurity Summit speakers represent private sector, government, academic, and non-profit points of view. Their collective experience will focus on what can be done now and how we can better plan for the future.
Matt Chessen
Matt Chessen
  • Foreign Service Science, Technology and Foreign Policy Fellow at George Washington University
  • Former EAP Coordinator for International Cyber Policy at the U.S. Department of State

Matt Chessen is a career U.S. diplomat, technologist and author. Before joining the diplomatic corps, Mr. Chessen started his own e-commerce company, and worked at Razorfish, managing the strategy development, design and implementation of large corporate websites. He served overseas in Liberia, Iraq and Afghanistan, where he was a POLAD to ISAF-HQ. He worked in Washington D.C. at the Bureau of Political-Military Affairs, and at the Office of eDiplomacy, where he led the implementation of an open-source, crowd-working platform for the Department of State and U.S. government called Open Opportunities. From 2014-2016, Mr. Chessen was the Coordinator for International Cyber Policy for the Bureau of East Asian and Pacific Affairs. He is currently the State Department Science and Technology Policy Fellow at the George Washington University, where he is researching the international implications of Artificial Intelligence and machine-driven communications. Mr. Chessen has a J.D. from Georgetown University, and an M.B.A. and B.A. from the University of Arizona. Matt is an avid futurist, fiction writer, scuba diver and adventure traveler.

read more
Ajit Gaddam
Ajit Gaddam
  • Chief Security Architect at VISA, Inc.

Ajit Gaddam is an Information and Cybersecurity leader with an established track record of developing risk-driven security programs and delivering solutions that support critical business initiatives. Over the last decade, Mr. Gaddam held senior roles at various financial, insurance, and technology firms driving information security programs, cyber security, security architecture, cloud security, and security operations. He also founded two startups and is an active participant in various open source and security architecture standards bodies.

read more
see all speakers
Why should you go
overviewwhy should you go?

Cybersecurity is a public health and global security issue. It requires an urgent, interdisciplinary approach strongly rooted in technology fundamentals and the acknowledgment that people -- from users to decision makers to engineers -- are a critical part of the network.

If you agree, the Global Cybersecurity Summit (GCS), the first of its kind in Ukraine’s history, is for you and the hundreds who will gather at one of the geo-strategic cyber crossroads of the world. Come learn, explore, and share your knowledge about important cyber issues, best practices, and innovations like artificial intelligence, the Internet of Things (IoT), policy and government, encryption, user responsibility, and more.

ProgramProgram
GCS is your chance to take advantage of a multidisciplinary line-up of keynotes and panels on the mainstage, a deep-dive workshop track where big brains will tackle big problems, hours worth of lightning talks, and an expo floor where you’ll find cybersecurity talent, products, employers, and experts.
Plenary 1.1
Creating the Next Generation of Cybersecurity Professionals
There are over 1 million cyber job openings throughout the world, expected to hit 1.5M by 2019. How are we closing the gap, who is doing it right, and what roles do traditional education, workforce redevelopment, and public-private partnerships play?
Plenary 1.2
Cybersecurity Research: From Academia to Independent Researchers and Beyond
$60B (USD) was spent on cybersecurity technology and services in 2016 with $1T (USD) expected over the next five years. Are we being effective, throwing money at a problem, spending it in the right places, or are we underestimating threat risk models?
Plenary 1.3
Collaboration and Threat Intelligence Sharing
The average Breach Detection Gap between being attacked and discovering the attack is 100 days. If better systems and processes were in place, could we drive this down further? What models work best?
Plenary 1.4
The Bold New World of IoT Security
Over 8B connected things used worldwide in 2017 with total spending on endpoints and services hitting nearly $2T (USD). 20B devices by 2020. How do we strengthen and defend IoT -- on the scale of the very small to the very big?
Lightning Talks
These strictly-timed 10-minute talks are where we some of the more brain-rubbing thoughts, unique points of view, cutting-edge analysis, and counterintuitive ideas may surface.
Plenary 2.1
Users, Users, Users!
End users are the most vulnerable part of any network. What will it take to drastically reduce the supermajority of attacks caused by a user’s bad digital hygiene and practices? What can we hope for, at best? What’s realistic?
Plenary 2.2
Encrypting the Future
As everything goes digital, everything becomes more vulnerable. What can the EU’s General Data Protection Regulation, the proliferation of encryption apps, blockchain, and the en masse rollover to https tell us about our encrypted future?
Plenary 2.3
Artificial Intelligence and Machine Learning
Are artificial intelligence and machine learning just fancy risk vectors or will they drastically reduce risk across all categories? How are we programming machines to program the next line of defense? Is the singularity near?
Plenary 2.4
Securing the Vote: Elections in a Digital World
France, Estonia, Germany, Norway, the United States, and more. What methods are being used to compromise hard and soft targets? Have we reached peak disinformation or is this just the beginning?
Venue MapsVenue Maps
first floor
  • 1
  • 2
  • 1
  • 2
first floor
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 1 Lounge area
  • 2 Selfie area
  • 3 Hall for Workshops
  • 4 Main hall of summits
  • 5 Meeting rooms
  • 6 Coffee break area
last newsLatest news
AI and the future of cyber defense
AI and the future of cyber defense
PRESENTED BY THE GLOBAL CYBERSECURITY SUMMIT The digital universe is expanding at an accelerating pace. Thanks to the internet of things (IoT), broadband communications, cheaper cloud storage, and computation power, every organization, company,…
read more
City on the frontline of cyberwarfare to host Global Cybersecurity Summit
City on the frontline of cyberwarfare to host Global Cybersecurity Summit
There has never been a more interesting time to hold a cybersecurity conference. Data breaches are breaking records year after year, the Internet of Things is dealing with a security crisis, and there’s a huge gap of cybersecurity talent to…
read more
media about usmedia about us

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

read more

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry's standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

Reserve your seatsReserve your seats
Ticket type Features Price
SUMMIT ATTENDANCE For Ukrainian citizens discount of 50%. Up to 20% discount for group orders
  • Participation in the Summit
  • Participation in practical workshops
  • Visit of the exhibition
  • Summit materials (Summit catalog, presentations of speakers)
  • Personal badge
  • Coffee breaks / Lunches
619 usd
buy ticket
VIP All Inclusive
  • Exquisite events make it possible to establish new partnership relations with international companies and Summit guests for your company in an informal atmosphere.
1500 usd
buy ticket
LIGHTNING TALKS
  • Participation in the Summit (Attendee Package)
  • 10 minutes presentation with the presentation of the company in the main hall of the Summit
  • Livestreaming around the world from the leading media portal The Daily Dot
1500 usd
buy ticket
EXHIBITION ATTENDANCE 
  • Exhibition attendance
  • Materials of the Summit (Summit catalog)
  • Personal badge
10 usd
buy ticket
SPEECH AT THE EXHIBITION
  • Participation in the Summit (Attendee Package)
  • 10 minutes speech with the presentation of the company in the exhibition hall during the Summit
1300 usd
buy ticket
SUMMIT ATTENDANCE For Ukrainian citizens discount of 50%. Up to 20% discount for group orders
  • Participation in the Summit
  • Participation in practical workshops
  • Visit of the exhibition
  • Summit materials (Summit catalog, presentations of speakers)
  • Personal badge
  • Coffee breaks / Lunches
619 usd
buy ticket
VIP All Inclusive
  • Exquisite events make it possible to establish new partnership relations with international companies and Summit guests for your company in an informal atmosphere.
1500 usd
buy ticket
LIGHTNING TALKS
  • Participation in the Summit (Attendee Package)
  • 10 minutes presentation with the presentation of the company in the main hall of the Summit
  • Livestreaming around the world from the leading media portal The Daily Dot
1500 usd
buy ticket
EXHIBITION ATTENDANCE 
  • Exhibition attendance
  • Materials of the Summit (Summit catalog)
  • Personal badge
10 usd
buy ticket
SPEECH AT THE EXHIBITION
  • Participation in the Summit (Attendee Package)
  • 10 minutes speech with the presentation of the company in the exhibition hall during the Summit
1300 usd
buy ticket
PartnersPartners
Join us and make history of Cybersecurity with us
Interested in sponsoring? Get in touch
Organizers
Co-organizers
Support
Participating
General Media partner
Intellectual Partner
Broadcast Partner
Event partner
faqfrequently asked questions
Q.

Timeliness of holding the cybersecurity summit cannot be overstated. What is its target audience - whether developers of software solutions or consumers of these services?

A.

Cybersecurity affects a multitude of stakeholders - from an individual computer-user in their living room to country leaders ensuring national security. This Summit is targeted toward all of these concerned audiences: consumer, technicians, instructors, developers, designers, advocates, entrepreneurs, tech experts, corporate leaders, non-governmental, and members of the government.

Q.

According to the summit's program, all speakers are foreigners. What criteria did you use choosing experts? Does this mean that the main language of the event will be English?

A.

When choosing our speakers and experts, we made sure to target relevant and diverse subject matter, focusing on a mix between the private, academic, non-profit, and government sectors. Since cybersecurity issues are, by nature, a borderless issue, we created a line-up of speakers with international, as well as in-country expertise. Our speakers will include experts and policymakers from the U.S., Western Europe, Ukraine and other regions of the world.

Q.

What main themes are speakers going to talk about? Please, define the most interesting reports that are "must be" for visiting participants and why.

A.

The main themes are broad, and are intended to touch upon the many aspects of cybersecurity - both the more prominent ones that are on the forefront of the news, and ones that are increasingly growing in importance. Focusing on current and future challenges, and most importantly, solutions, sample panel topics include: Creating the Next Generation of Cyber Pros The Bold New World of IoT Security AI and Machine Learning Securing the Vote: Elections in a Digital World Collaboration and Threat Intelligence Sharing Emerging Trends in Automation and Application Security From Cyber Academia to Independent Researchers & Beyond Encrypting the Future

Q.

In addition to reports panel discussions are planned. Who will take part in them and what most relevant topics will be discussed by their participants?

A.

In addition to the main panel events, the Summit will feature smaller fireside chats with some of our featured speakers, as well as local partners and sponsors. These intimate events will expand on the previously discussed panel topics, as well as give speakers more freedom to go into detail on topics of their choice. What's more, audience members will have the chance to ask questions, delving into deeper details on topics of their choice.

Q.

Tell us about special aspects of the organization of this event - which one was the most difficult and how did you overcome these difficulties?

A.

The most difficult aspect of organizing the Summit is being able to place our amazing speakers into just one or two panels each, considering the breadth of their expertise and their enthusiasm to speak on a multitude of topics. They had so many more ideas of panel topics, and fitting everything into two days is quite the challenge.

Q.

We know that the event is supported by public authorities - in what way their support is expressed?

A.

The Summit is being supported by a variety of governmental and institutional stakeholders in Ukraine, including the Ukrainian Ministry of Economic Development & Trade's State Finance Institution for Innovations (SFII), IT Ukraine Association, Telecommunication Chamber of Ukraine Association (TCU), Association of Information Technology Enterprises of Ukraine, Ukrainian Association of Information Security and Information Technology, and Hi-Tech Office Ukraine.

Q.

Give three tips for cybersecurity professionals as for what to do to be always aware of the latest industry's innovations?

A.

1. Stay connected - consume information on a global scale because information and developments are rapidly changing. 2. Don't always think as a defender or an offender - think from both your side and the side of your "attacker." Be flexible and anticipate threats. 3. Be aware of user vulnerabilities - identifying non-secure links, keeping software updated, encrypted communications and data. These are the daily technical tactics that will make major differences.

see more
hotelsHotels
The luxury InterContinental Kyiv hotel is situated in a truly prime location in Kyiv city, where the capital’s central business and historical districts come together. Experienced travellers will appreciate their proximity to corporate entities, government agencies and embassies, at the same time they can enjoy the best plays of the National Opera House, walks around historical and cultural sights, and multiple shopping opportunities.
Intercontinental
2A Velyka Zhytomyrska Street, 01001 Kyiv, UKRAINE
Tel: +380 44 219 19 19 Fax: +380 44 219 19 29
show on map book it
ContactsContacts
our adress
Kyiv, Parkova road, 16a
facebook.com/GCS2017KYIV