March 21, 2018 By Louise Byrne 3 min read

On May 15, 2018, IBM is holding a unique one-day security event at the Institution of Engineering and Technology (IET) in the heart of London. I caught up with IBM’s U.K. & Ireland Director of Security, Rob Sedman, to find out more.

Question: Thank you for your time today, Rob. Tell me about the Security Summit.

Sedman: I’m very excited to be leading our first ever Security Summit in London. We’re bringing together CISOs and security leaders along with their teams to meet and hear from experts in the security field, both from within and outside of IBM. Our speakers include Keren Elazari, Bruce Schneier and IBM’s own CISO, Shamla Naidoo, to name but a few.

We’re lucky to have some of the best security experts in the world at IBM and, by bringing them to London, we’re hoping that many of our clients will come and learn from them. That’s a primary reason we’re having a summit in London: With so many organizations based here, it’s the perfect location to bring people together.

Why is it important for CISOs to attend these kinds of events?

We all have busy jobs and lives, and sometimes it’s hard to make time, but I think it’s crucial that CISOs get together and share ideas. I have no doubt that the cybercriminals are working together, so we all need to be working together too if we are going to beat them.

It’s also vital to have the most up-to-date thinking in security. Threats are evolving constantly so it’s important to step back from time to time and take a fresh look at your security posture. Is what you’re doing still the best it can possibly be?

There are hundreds of security events every year. Why should a busy CISO make space in his or her diary for this one?

What I think really makes this event unique is that it’s all about practical, real-life learning. We’re not going to be sitting in a darkened room all day listening to PowerPoint presentations on topics that have been covered a thousand times. Instead we’ll be hearing short, sharp talks and stories from the field. There will be interactive workshops that you can go back to the office the next day and actually apply. For example, there are sessions around the role of the board in managing cyber risk and around how you can really reduce response times in a cyberattack.

It’s also a relatively small and intimate event. We want people to have the chance to actually speak to the experts and get their questions answered.

https://www.youtube.com/watch?v=MabWZoXMyI4

Who are you most excited to hear from at the Security Summit?

I think Dr. Saif Abed has a fascinating perspective. He’s a hugely insightful guy, he wrote a blog about the possible ramifications of a ransomware attack on hospitals just months before the WannaCry cyberattack hit the NHS. I think stories like his really bring home the importance of security to society: Not only can cyberattacks mean lost business or lost money, but they can also mean real people’s lives on the line, and that’s a scary thought.

I’m also excited to hear from Bruce Schneier. He’s a bit of a security rock star so I’m sure his talk will be very interesting. And, of course, Keren Elazari — her TED talk is brilliant. It’s been viewed by over 1.5 million people and was translated into 25 languages. I can’t wait to hear what she’s been up to since then. Keren’s storytelling style will be great at the end of a packed day — it’s a fantastic reason to stay to the end.

Sounds like there’s a lot to look forward to! Finally, I hear there’s a reception on the roof terrace at the end of the day, what’s the plan if it rains?

There’s some great views of London from the terrace, across to the London Eye and The Shard. You can even see the IBM office on the South Bank, so I’m hoping the great British summer won’t let us down. Fingers crossed!

Register now to secure your place at the London Security Summit

More from

How CTEM is providing better cybersecurity resilience for organizations

4 min read - Organizations today continuously face a number of fast-moving cyber threats that regularly challenge the effectiveness of their cybersecurity defenses. However, to keep pace, businesses need a proactive and adaptive approach to their security planning and execution.Cyber threat exposure management (CTEM) is an effective way to achieve this goal. It provides organizations with a reliable framework for identifying, assessing and mitigating new cyber risks as they materialize.The importance of developing cybersecurity resilienceRegardless of the industry, all organizations are subject to certain…

Insights from CISA’s red team findings and the evolution of EDR

3 min read - A recent CISA red team assessment of a United States critical infrastructure organization revealed systemic vulnerabilities in modern cybersecurity. Among the most pressing issues was a heavy reliance on endpoint detection and response (EDR) solutions, paired with a lack of network-level protections. These findings underscore a familiar challenge: Why do organizations place so much trust in EDR alone, and what must change to address its shortcomings? EDR’s double-edged sword A cornerstone of cyber resilience strategy, EDR solutions are prized for…

Is the water safe? The state of critical infrastructure cybersecurity

4 min read - On September 25, CISA issued a stark reminder that critical infrastructure remains a primary target for cyberattacks. Vulnerable systems in industrial sectors, including water utilities, continue to be exploited due to poor cyber hygiene practices. Using unsophisticated methods like brute-force attacks and leveraging default passwords, threat actors have repeatedly managed to compromise operational technology (OT) and industrial control systems (ICS).Attacks on the industrial sector have been particularly costly. The 2024 IBM Cost of a Data Breach report found the average total…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today