Learn how to deliver trustworthy IT and keep IT safe from malignant forces
Day 1: September 15, 2020
Day 1 welcome by IBM Academy of Technology President
This presentation describes key architectural patterns available to implement reliability into a software component or service. With the skill and experience in these techniques, the engineering professional can have a meaningful conversation with product owners on implementing reliability targets for a given service.
Encryption and key management is one of the most challenging areas to get right without interfering with the resilience and operation of systems. This session discusses the design considerations for building a resilient solution for hybrid cloud.
**Resiliency and Business Update Panel Discussion**
Andrea to give a perspective on Business and Operational Resiliency – especially in light of the COVID-19 Pandemic, and she will host a panel to discuss the market/client view of Business and Operational Resiliency, as well as the current state of accelerated cyber security attacks given the vulnerabilities caused by COVID-19. She will also give a view of what the IBM company is doing for Business Continuity Management (BCM) and how we are keeping our employees and clients safe in this highly volatile environment. Her guests on the panel will be:
Allen Downs, VP, Global Sales, Business Resiliency Services
BJ Klingenberg, CTO, Business Resiliency Services
Allen DownsAndrea SaylesBJ Klingenberg
PREVAIL2020 brings to you an amazing panel discussion featuring a number of industry experts from IBV and Industry Academy who speak about how businesses and industries are changing during pandemic and what will take precedence post pandemic. Our panellists are coming from Consumer and Travel & Transportation industries. Do not miss on this spectacular opportunity to hear from our experts.
Chad Andrews (moderator)J Gregory Land (GREG)Jane CheungLauren IsbellNikiforos ChatzopoulosSashank Rao Yaragudipati
Day 2: September 16, 2020
SRE is a term now used widely across our industry. But what does it mean and how can you do it? Ever wanted to know how to achieve high availability, but fast and frequent deployment to production. How can you enable Development squads to deploy to production as often as they want without risking outages? Learn how AIOps and Chatbots can help save you time and effort in a highly availably production system. This session will cover all these topics and more.
Threat modelling is not a new process to industry. But as other processes this also needs reminder and revisit by many of us. With Agile becoming an integral part process of software development the focus has shifted to continuous delivery. Threat modelling process helps to pause and look into corner cases of the product. Asset identification, trust level of users and overall communication in and out of product is the need of the hour. Threat model comes as a rescue to identify the vulnerabilities of product. It helps to seed security thoughts during the design of product. Doing product vulnerability analysis in such early stage of development helps us achieve security in design. The proposed session will share sample threat models from legacy software and cloud application. How in different product type we need to think about how to create threat model and keep it up-to-date for future releases.
Mobile devices, wearables and industrial internet of things will grow tremendously in next five years. This growth will be fueled by 5G, which will revolutionize the way we live and work. Despite these advantages of 5G, security experts are wary that 5G together with internet of things (IoT) will increase the attack surface, bringing new types of cyber vulnerabilities into our lives.
TThis session will provide pointers on the strategic planning vectors for managing the cybersecurity threat landscape as businesses migrate to Cloud to drive operational efficiency in the post pandemic world.
Day 2 welcome by IBM Academy of Technology President
Most organizations have their workloads (data and applications) distributed between an on premise infrastructure and different variants of cloud computing (IaaS, Paas, SaaS). Now when an organization would like to apply the zero trust principles in an holistic way they are confronted with different capabilities and different constraints in both environments. In this session I would like to highlight both the opportunities as well the challenges that organizations are faced with when they start to apply the zero trust principles as part of their overall security governance. Cloud providers have in general the zero trust principles already built in but where to start in the data center and how to cope with security at dual speed?
Stefaan Van Daele
Security is a key requirement in IT. If Cloud container platform changes the way to develop, deploy and operate applications, the need of security is still valid. The architecture that are deployed should be compliant with security rules and compliance requirements. During the session, we will visit what are the best practices to secure a cloud container platform, based on IBM Cloud Paks and Openshift. The advices and best practices are based on lessons learned from real client projects. By following these best practices, your container platform will become more secure.
Hybrid Cloud brings not only new technology, but also a new culture to traditional IT. This culture change is most famous for its embrace of techniques like Design Thinking, Agile development, and pair programming. This presentation discusses how Hybrid Cloud technology and culture reaches into the space of performance and scalability. We’ll discuss considerations and lessons from real-world experiences to engage the scalability and power of the Hybrid Cloud. The presentation will also cover how one team, the IBM Garage, is working to incorporate operational success factors like Scalability and Security into the very fabric of the new development culture.
How does security affect resilience? For example, are your cloud security measures implemented in a way that can respond to changing demand quickly, and do your security measures make your environment more resistant to disruption from different types of attacks? In this session, we'll discuss the essentials of cloud security -- such as threats, vulnerabilities, risks, and preventive and detective controls, and how different security measures can both positively and negatively impact resilience.
This session will discuss security mechanisms supported by IBM Cloud Paks to harden cloud platforms and applications like network security, Identity and access management, application security, end point security. This session also discusses how to characterize security performance and how to reduce the overhead balancing both security and performance needs of applications
Surya DuggiralaYanni Zhang
PREVAIL2020 brings to you an amazing panel discussion featuring a number of industry experts from IBV and Industry Academy who speak about how businesses and industries are changing during pandemic and what will take precedence post pandemic. Our panellists are coming from Banking & Financial Markets and Health & Life Sciences industries. Do not miss on this spectacular opportunity to hear from our experts.
Anil JainDhiraj KunwarHeather Fraser (moderator)Jianying HuPaolo Sironi
Discussion on DevSecOps, what it means and some of the best practices in the modern Cloud Native world.
Ahmed AbdelazizAndrea CrawfordHemankita PerabathiniHollis Chui
Day 3: September 17, 2020
This talk will share experience and practices about how we protect the whole DSWC portfolio on IBM public cloud from different aspects: Architecture Design, Application, Container, Data(SQL and noSQL databases), Operation(DevSecOps), Cloud platform, Network etc. After this presentation the audience will learn how to build a cybersecurity model on public cloud and get some real, on-the-ground experiences/practices. These experiences will defintely benefit other IBM portfolios as well as our clients.
Day 3 welcome by IBM Academy of Technology President
Double Trouble: how Operations Risk Insights mitigates the pandemic and global cyclone threats for IBMers and Non-profit Disaster Relief Agencies
Chet KarwatowskiRahul NaharThomas Ward
In this talk we present methods, tools, and processes that we have developed for the continuous compliance of the IBM GCDO Cognitive Enterprise Data Platform (CEDP). The presentation covers not only the newly developed tooling but also its management and the related compliance processes.
Andreas WespiChris GiblinDave RyanGrant MillerMonica ManniPascal Vetsch
AI is disrupting system performance. In this session CTO and IBM Fellow Sam Lightstone will highlight some of the emerging AI technologies that are creating knew opportunities for performance engineering. From Machine Learning to Deep Learning to Neuromorphic computing, learn how performance engineering is entering a new era beyond the fundamentals of throughput and latency of compute, storage and network. Profound changes are occurring as every layer of the stack is increasingly infused with AI.
Recent advancements in Cloud computing, which makes compute available for rent, Natural Language Processing via pre-trained language models such as Bi-directional Encoder Representations from Transformers (BERT) for language understanding, and Machine Learning via interpretable machine learning models are all making it possible to infuse AI into traditional business processes by tapping into semi-structured and unstructured data that was not effectively tapped into before. In this talk, I will discuss the opportunity to infuse AI into IT operations management. I will demonstrate how AI enables us to mine application and infrastructure logs, tickets, and IT Operations managers’ collaboration chat conversations in addition to metrics that are traditionally analyzed to better diagnose, repair and resolve problems. In addition, I’ll discuss how we can proactively avoid issues from happening by improving the quality of the software development lifecycle artifacts via feed-forward and feedback loops.
This presentation will cover the evolution of access management for a complex and distributed set of cloud resources while building IBM’s internal data platform. We will discuss the advantages and disadvantages we encountered along the way, the best practice patterns we have found, and a recommendation on how to follow.
Andreas WespiChris GiblinGrant MillerIlya Hardzeenka
Day 4: September 18, 2020
This talk will explore the concept of zero trust and will try to demystify zero trust models. The talk will focus on implementation and deployment scenarios of zero trust for organizations. How should the business prepare for the transition, what are the architectural requirements and what policies are required to be implemented?
• Network Security Assessment • Application Security assessment • IoT Devices security assessment • Secure code review • Configuration Review • Security Assessment of Mobile Applications • Malware Analysis
Geethu AravindSaha Mukesh
Meet the speakers
Senior Solutions Architect – IBM Garage for Technical Solution Acceleration
Vice President, Global Sales, Business Resiliency Services (IBM)
IBM Distinguished Engineer, DevOps (IBM)
General Manager, Business Resiliency Services (IBM)
Research Staff Member, IBM Research - Zurich (IBM)
MD, FACP; VP & Chief Health Information Officer (IBM)
IBM Distinguished Engineer, CTO – Client Resiliency Technology Enablement, IBM GTS
Chad Andrews (moderator)
Global Leader for Telecommunications, Media and Entertainment (TME) within the IBM's Institute for Business Value (IBV)
IBM CIO Digital Change Lead for Buy@IBM, STSM and AoT Blockchain TC Leadership team
Distinguished Engineer, CTO IBM Public Cloud Security IBM Cloud
Senior Software Engineer, IBM Research - Zurich (IBM)
Risk and Controls Leader, Global Chief Data Office (IBM)
Managing Director Business Banking, RAKBANK in UAE
Security Consultant (IBM)
DSW Commerce PAO Architect, CIO (IBM)
STSM, GCDO Security Engineering, Member IBM Academy of Technology
Heather Fraser (moderator)
Global Life Sciences & Healthcare Lead, IBM Institute for Business Value. IBM Industry Academy Member
Cloud Solution Engineer (IBM)
Sr DevOps Engineer – IBM Garage for Technical Solution Acceleration
Category Architect and Technical Delivery Lead
Distinguished Engineer in Service Management and Site Reliability Engineering (SRE) (IBM)
J Gregory Land (GREG)
Global Industry Leader – Aviation, Hospitality & Travel Related Services Executive Director, Travel & Transportation Global Team
Global Research Leader for the Consumer Industry, IBM Institute for Business Value. (IBM)
IBM Executive Architect Application specialty CTO for IBM Cloud Deployment Architects team - IBM Cloud Expert Labs IBM Academy of Technology member
BM Fellow, Global Science Leader of AI for Healthcare, and Director of Center for Computational at IBM Research
Integrated Transformation Business Development Executive (IBM)
Executive Security Architect, Cloud Engagement Hub (IBM)
Research Business Controls, IBM Research - Zurich (IBM)
Associate Partner Global Travel & Transportation & Client Executive Etihad Aviation Group (IBM)
Global Research Leader, Banking and Finance | IBM Institute for Business Value | IBM Industry Academy
Research Engineer, Security and Hybrid Cloud (IBM)
SIBM CAO, STSM
Distinguished Engineer, Site Reliability Engineering, IBM Cloud
IBM Fellow, CTO - AI for IT Operations. Master Inventor, IBM Academy Member
IBM Distinguished Engineer, Executive IT Architect
Senior Managing Consultant (IBM)
Security Consultant (IBM)
CTO for AI Strategy & IBM Fellow, IBM Data and AI
Sashank Rao Yaragudipati
Industry Leader for Retail in the IBM India Client Innovation Centre
IBM Fellow, IBM Garage and Solution Engineering (IBM)
Stefaan Van Daele
Executive Security Architect
IBM Cloud Engineering Guild Leader (IBM)
IBM CDO AI Project Leader, STSM, CSCMP and AoT ALT Member
Security Solutions Architect
Senior Software Engineer in IBM Cloud Pak Foundation (IBM)