The New Rules of Security

The world is changing and so is the way you keep it secure. As your business innovates, your security needs to be more integrated, collaborative and unified– and delivered at speed and scale. This requires a new approach. A different model that lets us succeed in spite of the chaos, that lets us go fast to meet any challenge head on. 

The new rules of security reduce risk by embracing openness; stop threats faster through practiced response and adoption of AI and cloud technologies; speed digital transformation with agile practices; and accelerate business growth with digital trust.

The IBM Security Summit for CISOs and Security leaders, offers a vision that shakes up the status quo to bring you ideas that help break through cybersecurity complexity and write new rules for a new era that ensure clients can enjoy comprehensive security at the speed of business.

For more information

Ponemon Institute's 2018 Cost of a Data Breach Study: Global Overview

IBM X-Force Command Cyber Tactical Operations Center Infographic

Preempt attacks with programmatic and active testing

Top 5 Myths about SIEM

Infographic: Put AI to Work in Your SOC

CISO Buyer’s Guide to AI: Beyond the Hype: AI in Your SOC

Key Takeaways

Learn how to prepare your organisation for a "boom" moment and how to embrace resiliency as a practice

Hear from experts on securing the enterprise to enable innovation and growth

Network with peers and experts in the security industry to learn what works, and what doesn't

Featured Sessions

 

Breakout Descriptions

Design Thinking Workshop: What are the demands of the business executives when it comes to managing cyber risk?

Discuss the needs  of the C Suite and the Line of Business executives when it comes to cyber risk, learn to apply design thinking technique such as “Empathy” mapping to understand the demands and share experiences with your peers.

MITRE ATT&CK™ Framework Workshop

The MITRE ATT&CK framework is increasingly being adopted by CISOs as a way of structuring and prioritising their Security plans. In this breakout we'll look together at what the framework is, why it's important, how it helps with planning and response, and how to use it to identify gaps in your current security posture.  Engage in a threat mapping exercise to understand a practical framework: which actor is relevant, their technique set, and how technology, people and processes could use those techniques to mitigate their "blindspots".

Embedding security in your cloud transformation

Moving you business to the Cloud doesn't mean needing to achieve different security outcomes but they can be achieved in different ways.  In this session we will look at simplifying the fulfilment of compliance requirements and moving towards a state of continuous compliance by using cloud native technologies and services.

Every second counts - A Cyber Resilience Experience  

In today’s world, it feels like a matter of when, not if, a cyber incident will impact your business.  Preparedness is the key to your ability to detect, contain and recover your business, your reputation and your customers.  Join Flick March, an IBM Cyber Resilience expert to experience for yourself how Every Second Counts when disaster strikes a business and how to minimise the impact.

Meet our speakers

Jessica Barker
World expert on aspects of cyber security

National Cyber Security Centre

Senior Representative NCSC
Our vision is to help make the UK the safest place to live and work online.

Diana Moldovan

Diana Moldovan
UKI Cyber Operations Lead, Aviva

IET London: Savoy Place, London WC2R 0BL

This unique London venue on the River Thames offers cutting-edge technology, improved capacity and new outside space easily accessible by rail, tube and river. The perfect location for our event.