Win $20,000. Help build the future of education. Answer the call. Learn more


This conference is free to attend.

Security subtitle

Learn how to deliver trustworthy IT and keep IT safe from malignant forces

Conference schedule

Day 1: September 15, 2020

  • Day 1 welcome by IBM Academy of Technology President

    Richard Hopkins

    Enter this session

  • This presentation describes key architectural patterns available to implement reliability into a software component or service. With the skill and experience in these techniques, the engineering professional can have a meaningful conversation with product owners on implementing reliability targets for a given service.

    Ingo Averdunk

    Enter this session

  • Encryption and key management is one of the most challenging areas to get right without interfering with the resilience and operation of systems. This session discusses the design considerations for building a resilient solution for hybrid cloud.

    Mark Buckwell

    Enter this session

    **Resiliency and Business Update Panel Discussion**

    Andrea to give a perspective on Business and Operational Resiliency – especially in light of the COVID-19 Pandemic, and she will host a panel to discuss the market/client view of Business and Operational Resiliency, as well as the current state of accelerated cyber security attacks given the vulnerabilities caused by COVID-19. She will also give a view of what the IBM company is doing for Business Continuity Management (BCM) and how we are keeping our employees and clients safe in this highly volatile environment. Her guests on the panel will be:

    Allen Downs, VP, Global Sales, Business Resiliency Services

    BJ Klingenberg, CTO, Business Resiliency Services

    Allen DownsAndrea SaylesBJ Klingenberg

    Enter this session

    PREVAIL2020 brings to you an amazing panel discussion featuring a number of industry experts from IBV and Industry Academy who speak about how businesses and industries are changing during pandemic and what will take precedence post pandemic. Our panellists are coming from Consumer and Travel & Transportation industries. Do not miss on this spectacular opportunity to hear from our experts.

    Chad Andrews (moderator)J Gregory Land (GREG)Jane CheungLauren IsbellNikiforos ChatzopoulosSashank Rao Yaragudipati

    Enter this session

Day 2: September 16, 2020

  • SRE is a term now used widely across our industry. But what does it mean and how can you do it? Ever wanted to know how to achieve high availability, but fast and frequent deployment to production. How can you enable Development squads to deploy to production as often as they want without risking outages? Learn how AIOps and Chatbots can help save you time and effort in a highly availably production system. This session will cover all these topics and more.

    Ralph Bateman

    Enter this session

  • Threat modelling is not a new process to industry. But as other processes this also needs reminder and revisit by many of us. With Agile becoming an integral part process of software development the focus has shifted to continuous delivery. Threat modelling process helps to pause and look into corner cases of the product. Asset identification, trust level of users and overall communication in and out of product is the need of the hour. Threat model comes as a rescue to identify the vulnerabilities of product. It helps to seed security thoughts during the design of product. Doing product vulnerability analysis in such early stage of development helps us achieve security in design. The proposed session will share sample threat models from legacy software and cloud application. How in different product type we need to think about how to create threat model and keep it up-to-date for future releases.

    Samvedna Jha

    Enter this session

  • Mobile devices, wearables and industrial internet of things will grow tremendously in next five years. This growth will be fueled by 5G, which will revolutionize the way we live and work. Despite these advantages of 5G, security experts are wary that 5G together with internet of things (IoT) will increase the attack surface, bringing new types of cyber vulnerabilities into our lives.

    Rima Bose

    Enter this session

  • TThis session will provide pointers on the strategic planning vectors for managing the cybersecurity threat landscape as businesses migrate to Cloud to drive operational efficiency in the post pandemic world.

    Sabitri Chakraborty

    Enter this session

  • Day 2 welcome by IBM Academy of Technology President

    Richard Hopkins

    Enter this session

  • Most organizations have their workloads (data and applications) distributed between an on premise infrastructure and different variants of cloud computing (IaaS, Paas, SaaS). Now when an organization would like to apply the zero trust principles in an holistic way they are confronted with different capabilities and different constraints in both environments. In this session I would like to highlight both the opportunities as well the challenges that organizations are faced with when they start to apply the zero trust principles as part of their overall security governance. Cloud providers have in general the zero trust principles already built in but where to start in the data center and how to cope with security at dual speed?

    Stefaan Van Daele

    Enter this session

  • Security is a key requirement in IT. If Cloud container platform changes the way to develop, deploy and operate applications, the need of security is still valid. The architecture that are deployed should be compliant with security rules and compliance requirements. During the session, we will visit what are the best practices to secure a cloud container platform, based on IBM Cloud Paks and Openshift. The advices and best practices are based on lessons learned from real client projects. By following these best practices, your container platform will become more secure.

    Jerome Tarte

    Enter this session

  • Hybrid Cloud brings not only new technology, but also a new culture to traditional IT. This culture change is most famous for its embrace of techniques like Design Thinking, Agile development, and pair programming. This presentation discusses how Hybrid Cloud technology and culture reaches into the space of performance and scalability. We’ll discuss considerations and lessons from real-world experiences to engage the scalability and power of the Hybrid Cloud. The presentation will also cover how one team, the IBM Garage, is working to incorporate operational success factors like Scalability and Security into the very fabric of the new development culture.

    Stacy Joines

    Enter this session

  • How does security affect resilience? For example, are your cloud security measures implemented in a way that can respond to changing demand quickly, and do your security measures make your environment more resistant to disruption from different types of attacks? In this session, we'll discuss the essentials of cloud security -- such as threats, vulnerabilities, risks, and preventive and detective controls, and how different security measures can both positively and negatively impact resilience.

    Chris Dotson

    Enter this session

  • This session will discuss security mechanisms supported by IBM Cloud Paks to harden cloud platforms and applications like network security, Identity and access management, application security, end point security. This session also discusses how to characterize security performance and how to reduce the overhead balancing both security and performance needs of applications

    Surya DuggiralaYanni Zhang

    Enter this session

    PREVAIL2020 brings to you an amazing panel discussion featuring a number of industry experts from IBV and Industry Academy who speak about how businesses and industries are changing during pandemic and what will take precedence post pandemic. Our panellists are coming from Banking & Financial Markets and Health & Life Sciences industries. Do not miss on this spectacular opportunity to hear from our experts.

    Anil JainDhiraj KunwarHeather Fraser (moderator)Jianying HuPaolo Sironi

    Enter this session

  • Discussion on DevSecOps, what it means and some of the best practices in the modern Cloud Native world.

    Ahmed AbdelazizAndrea CrawfordHemankita PerabathiniHollis Chui

    Enter this session

Day 3: September 17, 2020

  • This talk will share experience and practices about how we protect the whole DSWC portfolio on IBM public cloud from different aspects: Architecture Design, Application, Container, Data(SQL and noSQL databases), Operation(DevSecOps), Cloud platform, Network etc. After this presentation the audience will learn how to build a cybersecurity model on public cloud and get some real, on-the-ground experiences/practices. These experiences will defintely benefit other IBM portfolios as well as our clients.

    Gillian Yu

    Enter this session

  • Day 3 welcome by IBM Academy of Technology President

    Richard Hopkins

    Enter this session

  • Double Trouble: how Operations Risk Insights mitigates the pandemic and global cyclone threats for IBMers and Non-profit Disaster Relief Agencies

    Chet KarwatowskiRahul NaharThomas Ward

    Enter this session

  • In this talk we present methods, tools, and processes that we have developed for the continuous compliance of the IBM GCDO Cognitive Enterprise Data Platform (CEDP). The presentation covers not only the newly developed tooling but also its management and the related compliance processes.

    Andreas WespiChris GiblinDave RyanGrant MillerMonica ManniPascal Vetsch

    Enter this session

  • AI is disrupting system performance. In this session CTO and IBM Fellow Sam Lightstone will highlight some of the emerging AI technologies that are creating knew opportunities for performance engineering. From Machine Learning to Deep Learning to Neuromorphic computing, learn how performance engineering is entering a new era beyond the fundamentals of throughput and latency of compute, storage and network. Profound changes are occurring as every layer of the stack is increasingly infused with AI.

    Sam Lightstone

    Enter this session

  • Recent advancements in Cloud computing, which makes compute available for rent, Natural Language Processing via pre-trained language models such as Bi-directional Encoder Representations from Transformers (BERT) for language understanding, and Machine Learning via interpretable machine learning models are all making it possible to infuse AI into traditional business processes by tapping into semi-structured and unstructured data that was not effectively tapped into before. In this talk, I will discuss the opportunity to infuse AI into IT operations management. I will demonstrate how AI enables us to mine application and infrastructure logs, tickets, and IT Operations managers’ collaboration chat conversations in addition to metrics that are traditionally analyzed to better diagnose, repair and resolve problems. In addition, I’ll discuss how we can proactively avoid issues from happening by improving the quality of the software development lifecycle artifacts via feed-forward and feedback loops.

    Rama Akkiraju

    Enter this session

  • This presentation will cover the evolution of access management for a complex and distributed set of cloud resources while building IBM’s internal data platform. We will discuss the advantages and disadvantages we encountered along the way, the best practice patterns we have found, and a recommendation on how to follow.

    Andreas WespiChris GiblinGrant MillerIlya Hardzeenka

    Enter this session

Day 4: September 18, 2020

  • This talk will explore the concept of zero trust and will try to demystify zero trust models. The talk will focus on implementation and deployment scenarios of zero trust for organizations. How should the business prepare for the transition, what are the architectural requirements and what policies are required to be implemented?

    Vandana Verma

    Enter this session

  • Cloud Security

    Rima Bose

    Enter this session

  • • Network Security Assessment • Application Security assessment • IoT Devices security assessment • Secure code review • Configuration Review • Security Assessment of Mobile Applications • Malware Analysis

    Geethu AravindSaha Mukesh

    Enter this session

Meet the speakers

  • Ahmed Abdelaziz

    Senior Solutions Architect – IBM Garage for Technical Solution Acceleration

  • Allen Downs

    Vice President, Global Sales, Business Resiliency Services (IBM)

  • Andrea Crawford

    IBM Distinguished Engineer, DevOps (IBM)

  • Andrea Sayles

    General Manager, Business Resiliency Services (IBM)

  • Andreas Wespi

    Research Staff Member, IBM Research - Zurich (IBM)

  • Anil Jain

    MD, FACP; VP & Chief Health Information Officer (IBM)

  • BJ Klingenberg

    IBM Distinguished Engineer, CTO – Client Resiliency Technology Enablement, IBM GTS

  • Chad Andrews (moderator)

    Global Leader for Telecommunications, Media and Entertainment (TME) within the IBM's Institute for Business Value (IBV)

  • Chet Karwatowski

    IBM CIO Digital Change Lead for Buy@IBM, STSM and AoT Blockchain TC Leadership team

  • Chris Dotson

    Distinguished Engineer, CTO IBM Public Cloud Security IBM Cloud

  • Chris Giblin

    Senior Software Engineer, IBM Research - Zurich (IBM)

  • Dave Ryan

    Risk and Controls Leader, Global Chief Data Office (IBM)

  • Dhiraj Kunwar

    Managing Director Business Banking, RAKBANK in UAE

  • Geethu Aravind

    Security Consultant (IBM)

  • Gillian Yu

    DSW Commerce PAO Architect, CIO (IBM)

  • Grant Miller

    STSM, GCDO Security Engineering, Member IBM Academy of Technology

  • Heather Fraser (moderator)

    Global Life Sciences & Healthcare Lead, IBM Institute for Business Value. IBM Industry Academy Member

  • Hemankita Perabathini

    Cloud Solution Engineer (IBM)

  • Hollis Chui

    Sr DevOps Engineer – IBM Garage for Technical Solution Acceleration

  • Ilya Hardzeenka

    Category Architect and Technical Delivery Lead

  • Ingo Averdunk

    Distinguished Engineer in Service Management and Site Reliability Engineering (SRE) (IBM)

  • J Gregory Land (GREG)

    Global Industry Leader – Aviation, Hospitality & Travel Related Services Executive Director, Travel & Transportation Global Team

  • Jane Cheung

    Global Research Leader for the Consumer Industry, IBM Institute for Business Value. (IBM)

  • Jerome Tarte

    IBM Executive Architect Application specialty CTO for IBM Cloud Deployment Architects team - IBM Cloud Expert Labs IBM Academy of Technology member

  • Jianying Hu

    BM Fellow, Global Science Leader of AI for Healthcare, and Director of Center for Computational at IBM Research

  • Lauren Isbell

    Integrated Transformation Business Development Executive (IBM)

  • Mark Buckwell

    Executive Security Architect, Cloud Engagement Hub (IBM)

  • Monica Manni

    Research Business Controls, IBM Research - Zurich (IBM)

  • Nikiforos Chatzopoulos

    Associate Partner Global Travel & Transportation & Client Executive Etihad Aviation Group (IBM)

  • Paolo Sironi

    Global Research Leader, Banking and Finance | IBM Institute for Business Value | IBM Industry Academy

  • Pascal Vetsch

    Research Engineer, Security and Hybrid Cloud (IBM)

  • Rahul Nahar


  • Ralph Bateman

    Distinguished Engineer, Site Reliability Engineering, IBM Cloud

  • Rama Akkiraju

    IBM Fellow, CTO - AI for IT Operations. Master Inventor, IBM Academy Member

  • Richard Hopkins

    IBM Distinguished Engineer, Executive IT Architect

  • Rima Bose


  • Sabitri Chakraborty

    Senior Managing Consultant (IBM)

  • Saha Mukesh

    Security Consultant (IBM)

  • Sam Lightstone

    CTO for AI Strategy & IBM Fellow, IBM Data and AI

  • Samvedna Jha

    Security Architect

  • Sashank Rao Yaragudipati

    Industry Leader for Retail in the IBM India Client Innovation Centre

  • Stacy Joines

    IBM Fellow, IBM Garage and Solution Engineering (IBM)

  • Stefaan Van Daele

    Executive Security Architect

  • Surya Duggirala

    IBM Cloud Engineering Guild Leader (IBM)

  • Thomas Ward

    IBM CDO AI Project Leader, STSM, CSCMP and AoT ALT Member

  • Vandana Verma

    Security Solutions Architect

  • Yanni Zhang

    Senior Software Engineer in IBM Cloud Pak Foundation (IBM)

See all the speakers