THE GLOBAL SOUTH SITUATION
Financial institutions across the Caribbean, Latin America, Africa, and Asia-Pacific are operating in a threat environment that has fundamentally changed. Attackers are now using AI to automate intrusions, generate convincing deepfakes, and bypass defences that were built for a different era, evidenced by a $148 million breach in Brazil and AI-cloned executives successfully draining accounts in West Africa and Singapore.
The financial cost is severe. Average breach recovery across these regions now ranges from USD $2.58 million to $3.9 million. The immediate losses are sometimes recoverable. The reputational damage, customer exodus, and loss of correspondent banking relationships often are not.
Regulatory enforcement is escalating in parallel. Singapore allows fines of up to 10% of annual turnover. Jamaica’s Data Protection Act allows up to 4%. Nigeria’s regulators have issued direct institutional penalties running into hundreds of millions of naira.
Regulators are no longer writing to IT. They are naming board directors and C-suite executives personally liable.
Most boards find out too late.
To ensure your leadership team isn’t caught off guard, shifting from reactive compliance to proactive defense is the most prudent way forward.
Why The Investment Is Non-Negotiable
Regulatory exposure
Fines reaching up to 10% of annual global turnover across Global South jurisdictions. For a mid-sized bank, this represents a multi-million-dollar liability.
Personal liability
Across all regions, board members and C-suite executives are being held individually accountable for governance failures, not just the institution.
Value of Programme Per decision-maker
Top-5 international consultancies charge up to $50,000 USD for a comparable exercise. Get a programme specifically designed for the Global South at a fifth of the cost: $9,500 for 10 executives ($950 each).
Proactive Risk Reduction
Global South breach recoveries average $2.58M to $3.9M USD. This programme provides the playbook and simulation practice required to actively defend your institution, mitigating massive financial risk for less than 1% of the potential cost.
The Two-Day Structure
Day 1 | June 23: The Fiduciary Shield
7:00 AM – 12:30 PM EST
Governance, board liability, and regulatory exposure. Expert briefings on the 2026–2027 threat landscape, cross-border data laws, and cyber-enabled financial crime.
Deliverable: Your Localized Board Risk Charter
Day 2 | June 24: Cyber Attack Simulation
7:00 AM – 1:00 PM EST
Live crisis decision-making under real pressure. Live ethical hacking demo. 60-minute escalating simulation with timed injects — ransom countdowns, simulated media leaks.
Deliverable: Your “Kill Switch” Ransomware Protocol
What Participants Leave With
Day 1: Localized Board Risk Charter — your institution’s risk tolerances, governance boundaries, and a legally defensible framework, in writing.
Day 2: “Kill Switch” Ransomware Decision Protocol — codified matrix defining exactly who holds authority in a crisis and under what conditions.
Both Days: A cross-functional 72-hour breach response playbook and a defensible record of executive preparedness for regulators.
Who Should Attend
-
Board Members & Directors
-
Chief Executive Officer
-
Chief Financial Officer
-
General Counsel
-
Chief Risk Officer
-
Head of Corporate Communications
-
Chief Information Security Officer
What Participants Said At Our February 2026 Summit
“The live simulation provided a realistic environment to stress-test our governance frameworks. This confirmed the summit’s relevance for real-world application, especially in Global South contexts where digital trust is mission-critical.”
— Augustine Kurumeh Chisom, A Storms Coming LLC
“The cross-section of panellists and the information they provided was excellent.”
— Jason Lewis, National Commercial Bank Jamaica
“The relevance to our organisation was a 10 out of 10.”
— Daniel R. Reid, Cayman Islands Stock Exchange
Programme Pricing
Tier 1: Banks, insurers, conglomerates with 500+ employees
-
Up to 10 executives
-
Early booking (before Apr 30): $7,600 USD (Save $1,900, 20%)
-
Standard rate: $9,500 USD
Tier 2: Regional banks, credit unions, fintechs with under 500 employees
-
Up to 5 executives
-
Early booking (before Apr 30): $3,800 USD (Save $950, 20%)
-
Standard rate: $4,750 USD
*The programme is capped at 65 organisations globally. To request a fast-track invoice: sales@gspen.net
Secure Your Organisation’s Command Center
Register before April 30th to lock in your 20% early booking advantage
Or contact our Executive Concierge: sales@gspen.net
65 organisations maximum globally. Once capacity is reached, registration closes.
Times below are displayed in: (UTC -5)
Session 1 – June 23, 2026 | 5h 30m ▼
2 speakers
Day 1Welcome & Programme Introduction
7:00 AM – 7:15 AM (UTC -5)Welcome & Programme Introduction
Niel Harper
Day 1The Governance Gap: Passive Oversight is Personal Liability
7:15 AM – 7:45 AM (UTC -5)Fiduciary duty as a non-delegable board responsibility
No speaker
Day 1Coffee Break
7:45 AM – 8:00 AM (UTC -5)15-minute break
Jason Lau
Day 1The Cyber Threat Landscape for 2026/2027
8:05 AM – 8:35 AM (UTC -5)AI-driven attacks targeting financial data and predictive threat intelligence
No speaker
Day 1Coffee Break
8:35 AM – 8:50 AM (UTC -5)15-minute break
Rosalind Lake
Day 1The Borderless Minefield: AI & Data Privacy Laws
8:55 AM – 9:30 AM (UTC -5)4% turnover fines, 72-hour reporting windows, and cross-border data law
Nyron Davidson
Day 1Cyber-Enabled Financial Crime
9:30 AM – 10:00 AM (UTC -5)How cybercriminals execute systemic fraud and bypass AML/CFT controls
No speaker
Day 1Transition Break
10:00 AM – 10:15 AM (UTC -5)15-minute transition break
4 speakers
Day 1Best Practices Breakout Sessions
10:20 AM – 11:25 AM (UTC -5)Departmental risk tolerance drafting
3 speakers
Day 1The Board Charter Plenary
11:25 AM – 12:15 PM (UTC -5)Aggregating outputs into the Board Risk Charter
No speaker
Day 1Networking & Wrap-Up
12:15 PM – 12:30 PM (UTC -5)Setting expectations for Day 2’s live simulation
Session 2 – June 24, 2026 | 6h ▼
2 speakers
Day 2Day 2 Introduction & Day 1 Review
7:00 AM – 7:15 AM (UTC -5)Day 1 recap and overview of Day 2
2 speakers
Day 2Fireside Chat: Operational Imperatives for Boards
7:15 AM – 7:45 AM (UTC -5)Discussion on operational priorities for boards
No speaker
Day 2Coffee Break
7:45 AM – 8:00 AM (UTC -5)15-minute break
Rory Ebanks
Day 2Anatomy of a Collapse
8:05 AM – 8:35 AM (UTC -5)Step-by-step deconstruction of a real regional bank hack
No speaker
Day 2Coffee & Networking Break
8:35 AM – 8:50 AM (UTC -5)15-minute networking break
Dr. Bright Gameli Mawudor
Day 2Inside the Mind of the Attacker — Live Demo
8:55 AM – 9:30 AM (UTC -5)Live AI-driven attack demonstration against financial sector defences
Deborah Hileman
Day 2The War Narrative: Crisis Communications
9:30 AM – 10:00 AM (UTC -5)Catastrophic PR failures and drafting the first holding statement
No speaker
Day 2Transition Break
10:00 AM – 10:15 AM (UTC -5)15-minute transition break
2 speakers
Day 2The Ransom Dilemma: Legal & Governance Realities
10:20 AM – 10:55 AM (UTC -5)Regulatory sanctions, terrorist financing laws, and fiduciary implications
No speaker
Day 2The Ransom Decision: Live Evolving Simulation
10:55 AM – 11:55 AM (UTC -5)Live attack simulation with timed injects and decision-making scenarios
No speaker
Day 2Transition Break
11:55 AM – 12:10 PM (UTC -5)15-minute transition break
No speaker
Day 2Protocol Finalization
12:15 PM – 12:50 PM (UTC -5)Simulation post-mortem to finalize decision protocols
2 speakers
Day 2Final Wrap-Up & Adjournment
12:50 PM – 1:00 PM (UTC -5)Closing remarks and adjournment
Jason Lau
Niel Harper
Rory Ebanks
Nyron Davidson
Rosalind Lake
Grace Lindo
Deborah Hileman
Dr. Bright Gameli Mawudor
Douglas Davidson
THE GLOBAL SOUTH SITUATION
Financial institutions across the Caribbean, Latin America, Africa, and Asia-Pacific are operating in a threat environment that has fundamentally changed. Attackers are now using AI to automate intrusions, generate convincing deepfakes, and bypass defences that were built for a different era, evidenced by a $148 million breach in Brazil and AI-cloned executives successfully draining accounts in West Africa and Singapore.
The financial cost is severe. Average breach recovery across these regions now ranges from USD $2.58 million to $3.9 million. The immediate losses are sometimes recoverable. The reputational damage, customer exodus, and loss of correspondent banking relationships often are not.
Regulatory enforcement is escalating in parallel. Singapore allows fines of up to 10% of annual turnover. Jamaica’s Data Protection Act allows up to 4%. Nigeria’s regulators have issued direct institutional penalties running into hundreds of millions of naira.
Regulators are no longer writing to IT. They are naming board directors and C-suite executives personally liable.
Most boards find out too late.
To ensure your leadership team isn’t caught off guard, shifting from reactive compliance to proactive defense is the most prudent way forward.
Why The Investment Is Non-Negotiable
Regulatory exposure
Fines reaching up to 10% of annual global turnover across Global South jurisdictions. For a mid-sized bank, this represents a multi-million-dollar liability.
Personal liability
Across all regions, board members and C-suite executives are being held individually accountable for governance failures, not just the institution.
Value of Programme Per decision-maker
Top-5 international consultancies charge up to $50,000 USD for a comparable exercise. Get a programme specifically designed for the Global South at a fifth of the cost: $9,500 for 10 executives ($950 each).
Proactive Risk Reduction
Global South breach recoveries average $2.58M to $3.9M USD. This programme provides the playbook and simulation practice required to actively defend your institution, mitigating massive financial risk for less than 1% of the potential cost.
The Two-Day Structure
Day 1 | June 23: The Fiduciary Shield
7:00 AM – 12:30 PM EST
Governance, board liability, and regulatory exposure. Expert briefings on the 2026–2027 threat landscape, cross-border data laws, and cyber-enabled financial crime.
Deliverable: Your Localized Board Risk Charter
Day 2 | June 24: Cyber Attack Simulation
7:00 AM – 1:00 PM EST
Live crisis decision-making under real pressure. Live ethical hacking demo. 60-minute escalating simulation with timed injects — ransom countdowns, simulated media leaks.
Deliverable: Your “Kill Switch” Ransomware Protocol
What Participants Leave With
Day 1: Localized Board Risk Charter — your institution’s risk tolerances, governance boundaries, and a legally defensible framework, in writing.
Day 2: “Kill Switch” Ransomware Decision Protocol — codified matrix defining exactly who holds authority in a crisis and under what conditions.
Both Days: A cross-functional 72-hour breach response playbook and a defensible record of executive preparedness for regulators.
Who Should Attend
-
Board Members & Directors
-
Chief Executive Officer
-
Chief Financial Officer
-
General Counsel
-
Chief Risk Officer
-
Head of Corporate Communications
-
Chief Information Security Officer
What Participants Said At Our February 2026 Summit
“The live simulation provided a realistic environment to stress-test our governance frameworks. This confirmed the summit’s relevance for real-world application, especially in Global South contexts where digital trust is mission-critical.”
— Augustine Kurumeh Chisom, A Storms Coming LLC
“The cross-section of panellists and the information they provided was excellent.”
— Jason Lewis, National Commercial Bank Jamaica
“The relevance to our organisation was a 10 out of 10.”
— Daniel R. Reid, Cayman Islands Stock Exchange
Programme Pricing
Tier 1: Banks, insurers, conglomerates with 500+ employees
-
Up to 10 executives
-
Early booking (before Apr 30): $7,600 USD (Save $1,900, 20%)
-
Standard rate: $9,500 USD
Tier 2: Regional banks, credit unions, fintechs with under 500 employees
-
Up to 5 executives
-
Early booking (before Apr 30): $3,800 USD (Save $950, 20%)
-
Standard rate: $4,750 USD
*The programme is capped at 65 organisations globally. To request a fast-track invoice: sales@gspen.net
Secure Your Organisation’s Command Center
Register before April 30th to lock in your 20% early booking advantage
Or contact our Executive Concierge: sales@gspen.net
65 organisations maximum globally. Once capacity is reached, registration closes.
Times below are displayed in: (UTC -5)
Session 1 – June 23, 2026 | 5h 30m ▼
2 speakers
Day 1Welcome & Programme Introduction
7:00 AM – 7:15 AM (UTC -5)Welcome & Programme Introduction
Niel Harper
Day 1The Governance Gap: Passive Oversight is Personal Liability
7:15 AM – 7:45 AM (UTC -5)Fiduciary duty as a non-delegable board responsibility
No speaker
Day 1Coffee Break
7:45 AM – 8:00 AM (UTC -5)15-minute break
Jason Lau
Day 1The Cyber Threat Landscape for 2026/2027
8:05 AM – 8:35 AM (UTC -5)AI-driven attacks targeting financial data and predictive threat intelligence
No speaker
Day 1Coffee Break
8:35 AM – 8:50 AM (UTC -5)15-minute break
Rosalind Lake
Day 1The Borderless Minefield: AI & Data Privacy Laws
8:55 AM – 9:30 AM (UTC -5)4% turnover fines, 72-hour reporting windows, and cross-border data law
Nyron Davidson
Day 1Cyber-Enabled Financial Crime
9:30 AM – 10:00 AM (UTC -5)How cybercriminals execute systemic fraud and bypass AML/CFT controls
No speaker
Day 1Transition Break
10:00 AM – 10:15 AM (UTC -5)15-minute transition break
4 speakers
Day 1Best Practices Breakout Sessions
10:20 AM – 11:25 AM (UTC -5)Departmental risk tolerance drafting
3 speakers
Day 1The Board Charter Plenary
11:25 AM – 12:15 PM (UTC -5)Aggregating outputs into the Board Risk Charter
No speaker
Day 1Networking & Wrap-Up
12:15 PM – 12:30 PM (UTC -5)Setting expectations for Day 2’s live simulation
Session 2 – June 24, 2026 | 6h ▼
2 speakers
Day 2Day 2 Introduction & Day 1 Review
7:00 AM – 7:15 AM (UTC -5)Day 1 recap and overview of Day 2
2 speakers
Day 2Fireside Chat: Operational Imperatives for Boards
7:15 AM – 7:45 AM (UTC -5)Discussion on operational priorities for boards
No speaker
Day 2Coffee Break
7:45 AM – 8:00 AM (UTC -5)15-minute break
Rory Ebanks
Day 2Anatomy of a Collapse
8:05 AM – 8:35 AM (UTC -5)Step-by-step deconstruction of a real regional bank hack
No speaker
Day 2Coffee & Networking Break
8:35 AM – 8:50 AM (UTC -5)15-minute networking break
Dr. Bright Gameli Mawudor
Day 2Inside the Mind of the Attacker — Live Demo
8:55 AM – 9:30 AM (UTC -5)Live AI-driven attack demonstration against financial sector defences
Deborah Hileman
Day 2The War Narrative: Crisis Communications
9:30 AM – 10:00 AM (UTC -5)Catastrophic PR failures and drafting the first holding statement
No speaker
Day 2Transition Break
10:00 AM – 10:15 AM (UTC -5)15-minute transition break
2 speakers
Day 2The Ransom Dilemma: Legal & Governance Realities
10:20 AM – 10:55 AM (UTC -5)Regulatory sanctions, terrorist financing laws, and fiduciary implications
No speaker
Day 2The Ransom Decision: Live Evolving Simulation
10:55 AM – 11:55 AM (UTC -5)Live attack simulation with timed injects and decision-making scenarios
No speaker
Day 2Transition Break
11:55 AM – 12:10 PM (UTC -5)15-minute transition break
No speaker
Day 2Protocol Finalization
12:15 PM – 12:50 PM (UTC -5)Simulation post-mortem to finalize decision protocols
2 speakers
Day 2Final Wrap-Up & Adjournment
12:50 PM – 1:00 PM (UTC -5)Closing remarks and adjournment