Security subtitle
Learn how to deliver trustworthy IT and keep IT safe from malignant forces
Conference schedule
Day 1: September 15, 2020
-
-
Speakers: Ingo Averdunk
This presentation describes key architectural patterns available to implement reliability into a software component or service. With the skill and experience in these techniques, the engineering professional can have a meaningful conversation with product owners on implementing reliability targets for a given service.
-
Speakers: Mark Buckwell
Encryption and key management is one of the most challenging areas to get right without interfering with the resilience and operation of systems. This session discusses the design considerations for building a resilient solution for hybrid cloud.
-
Speakers: Allen DownsAndrea SaylesBJ Klingenberg
AMERICAS FRIENDLY:
**Resiliency and Business Update Panel Discussion**
Andrea to give a perspective on Business and Operational Resiliency – especially in light of the COVID-19 Pandemic, and she will host a panel to discuss the market/client view of Business and Operational Resiliency, as well as the current state of accelerated cyber security attacks given the vulnerabilities caused by COVID-19. She will also give a view of what the IBM company is doing for Business Continuity Management (BCM) and how we are keeping our employees and clients safe in this highly volatile environment. Her guests on the panel will be:
Allen Downs, VP, Global Sales, Business Resiliency Services
BJ Klingenberg, CTO, Business Resiliency Services -
Speakers: Chad Andrews (moderator)J Gregory Land (GREG)Jane CheungLauren IsbellNikiforos ChatzopoulosSashank Rao Yaragudipati
AMERICAS FRIENDLY:
PREVAIL2020 brings to you an amazing panel discussion featuring a number of industry experts from IBV and Industry Academy who speak about how businesses and industries are changing during pandemic and what will take precedence post pandemic. Our panellists are coming from Consumer and Travel & Transportation industries. Do not miss on this spectacular opportunity to hear from our experts.
Day 2: September 16, 2020
-
Speakers: Ralph Bateman
SRE is a term now used widely across our industry. But what does it mean and how can you do it? Ever wanted to know how to achieve high availability, but fast and frequent deployment to production. How can you enable Development squads to deploy to production as often as they want without risking outages? Learn how AIOps and Chatbots can help save you time and effort in a highly availably production system. This session will cover all these topics and more.
-
Speakers: Samvedna Jha
Threat modelling is not a new process to industry. But as other processes this also needs reminder and revisit by many of us. With Agile becoming an integral part process of software development the focus has shifted to continuous delivery. Threat modelling process helps to pause and look into corner cases of the product. Asset identification, trust level of users and overall communication in and out of product is the need of the hour. Threat model comes as a rescue to identify the vulnerabilities of product. It helps to seed security thoughts during the design of product. Doing product vulnerability analysis in such early stage of development helps us achieve security in design. The proposed session will share sample threat models from legacy software and cloud application. How in different product type we need to think about how to create threat model and keep it up-to-date for future releases.
-
Speakers: Rima Bose
Mobile devices, wearables and industrial internet of things will grow tremendously in next five years. This growth will be fueled by 5G, which will revolutionize the way we live and work. Despite these advantages of 5G, security experts are wary that 5G together with internet of things (IoT) will increase the attack surface, bringing new types of cyber vulnerabilities into our lives.
-
Speakers: Sabitri Chakraborty
TThis session will provide pointers on the strategic planning vectors for managing the cybersecurity threat landscape as businesses migrate to Cloud to drive operational efficiency in the post pandemic world.
-
-
Speakers: Stefaan Van Daele
Most organizations have their workloads (data and applications) distributed between an on premise infrastructure and different variants of cloud computing (IaaS, Paas, SaaS). Now when an organization would like to apply the zero trust principles in an holistic way they are confronted with different capabilities and different constraints in both environments. In this session I would like to highlight both the opportunities as well the challenges that organizations are faced with when they start to apply the zero trust principles as part of their overall security governance. Cloud providers have in general the zero trust principles already built in but where to start in the data center and how to cope with security at dual speed?
-
Speakers: Jerome Tarte
Security is a key requirement in IT. If Cloud container platform changes the way to develop, deploy and operate applications, the need of security is still valid. The architecture that are deployed should be compliant with security rules and compliance requirements. During the session, we will visit what are the best practices to secure a cloud container platform, based on IBM Cloud Paks and Openshift. The advices and best practices are based on lessons learned from real client projects. By following these best practices, your container platform will become more secure.
-
Speakers: Stacy Joines
Hybrid Cloud brings not only new technology, but also a new culture to traditional IT. This culture change is most famous for its embrace of techniques like Design Thinking, Agile development, and pair programming. This presentation discusses how Hybrid Cloud technology and culture reaches into the space of performance and scalability. We’ll discuss considerations and lessons from real-world experiences to engage the scalability and power of the Hybrid Cloud. The presentation will also cover how one team, the IBM Garage, is working to incorporate operational success factors like Scalability and Security into the very fabric of the new development culture.
-
Speakers: Chris Dotson
How does security affect resilience? For example, are your cloud security measures implemented in a way that can respond to changing demand quickly, and do your security measures make your environment more resistant to disruption from different types of attacks? In this session, we'll discuss the essentials of cloud security -- such as threats, vulnerabilities, risks, and preventive and detective controls, and how different security measures can both positively and negatively impact resilience.
-
Speakers: Surya DuggiralaYanni Zhang
This session will discuss security mechanisms supported by IBM Cloud Paks to harden cloud platforms and applications like network security, Identity and access management, application security, end point security. This session also discusses how to characterize security performance and how to reduce the overhead balancing both security and performance needs of applications
-
Speakers: Anil JainDhiraj KunwarHeather Fraser (moderator)Jianying HuPaolo Sironi
AMERICAS FRIENDLY:
PREVAIL2020 brings to you an amazing panel discussion featuring a number of industry experts from IBV and Industry Academy who speak about how businesses and industries are changing during pandemic and what will take precedence post pandemic. Our panellists are coming from Banking & Financial Markets and Health & Life Sciences industries. Do not miss on this spectacular opportunity to hear from our experts. -
Speakers: Ahmed AbdelazizAndrea CrawfordHemankita PerabathiniHollis Chui
Discussion on DevSecOps, what it means and some of the best practices in the modern Cloud Native world.
Day 3: September 17, 2020
-
Speakers: Gillian Yu
This talk will share experience and practices about how we protect the whole DSWC portfolio on IBM public cloud from different aspects: Architecture Design, Application, Container, Data(SQL and noSQL databases), Operation(DevSecOps), Cloud platform, Network etc. After this presentation the audience will learn how to build a cybersecurity model on public cloud and get some real, on-the-ground experiences/practices. These experiences will defintely benefit other IBM portfolios as well as our clients.
-
-
Speakers: Chet KarwatowskiRahul NaharThomas Ward
Double Trouble: how Operations Risk Insights mitigates the pandemic and global cyclone threats for IBMers and Non-profit Disaster Relief Agencies
-
Speakers: Andreas WespiChris GiblinDave RyanGrant MillerMonica ManniPascal Vetsch
In this talk we present methods, tools, and processes that we have developed for the continuous compliance of the IBM GCDO Cognitive Enterprise Data Platform (CEDP). The presentation covers not only the newly developed tooling but also its management and the related compliance processes.
-
Speakers: Sam Lightstone
AI is disrupting system performance. In this session CTO and IBM Fellow Sam Lightstone will highlight some of the emerging AI technologies that are creating knew opportunities for performance engineering. From Machine Learning to Deep Learning to Neuromorphic computing, learn how performance engineering is entering a new era beyond the fundamentals of throughput and latency of compute, storage and network. Profound changes are occurring as every layer of the stack is increasingly infused with AI.
-
Speakers: Rama Akkiraju
Recent advancements in Cloud computing, which makes compute available for rent, Natural Language Processing via pre-trained language models such as Bi-directional Encoder Representations from Transformers (BERT) for language understanding, and Machine Learning via interpretable machine learning models are all making it possible to infuse AI into traditional business processes by tapping into semi-structured and unstructured data that was not effectively tapped into before. In this talk, I will discuss the opportunity to infuse AI into IT operations management. I will demonstrate how AI enables us to mine application and infrastructure logs, tickets, and IT Operations managers’ collaboration chat conversations in addition to metrics that are traditionally analyzed to better diagnose, repair and resolve problems. In addition, I’ll discuss how we can proactively avoid issues from happening by improving the quality of the software development lifecycle artifacts via feed-forward and feedback loops.
-
Speakers: Andreas WespiChris GiblinGrant MillerIlya Hardzeenka
This presentation will cover the evolution of access management for a complex and distributed set of cloud resources while building IBM’s internal data platform. We will discuss the advantages and disadvantages we encountered along the way, the best practice patterns we have found, and a recommendation on how to follow.
Day 4: September 18, 2020
-
Speakers: Vandana Verma
This talk will explore the concept of zero trust and will try to demystify zero trust models. The talk will focus on implementation and deployment scenarios of zero trust for organizations. How should the business prepare for the transition, what are the architectural requirements and what policies are required to be implemented?
-
-
Speakers: Geethu AravindSaha Mukesh
• Network Security Assessment • Application Security assessment • IoT Devices security assessment • Secure code review • Configuration Review • Security Assessment of Mobile Applications • Malware Analysis
Meet the speakers
Ahmed Abdelaziz
Senior Solutions Architect – IBM Garage for Technical Solution Acceleration
Allen Downs
Vice President, Global Sales, Business Resiliency Services (IBM)
Andrea Crawford
IBM Distinguished Engineer, DevOps (IBM)
Andrea Sayles
General Manager, Business Resiliency Services (IBM)
Andreas Wespi
Research Staff Member, IBM Research - Zurich (IBM)
Anil Jain
MD, FACP; VP & Chief Health Information Officer (IBM)
BJ Klingenberg
IBM Distinguished Engineer, CTO – Client Resiliency Technology Enablement, IBM GTS
Chad Andrews (moderator)
Global Leader for Telecommunications, Media and Entertainment (TME) within the IBM's Institute for Business Value (IBV)
Chet Karwatowski
IBM CIO Digital Change Lead for Buy@IBM, STSM and AoT Blockchain TC Leadership team
Chris Dotson
Distinguished Engineer, CTO IBM Public Cloud Security IBM Cloud
Chris Giblin
Senior Software Engineer, IBM Research - Zurich (IBM)
Dave Ryan
Risk and Controls Leader, Global Chief Data Office (IBM)
Dhiraj Kunwar
Managing Director Business Banking, RAKBANK in UAE
Geethu Aravind
Security Consultant (IBM)
Gillian Yu
DSW Commerce PAO Architect, CIO (IBM)
Grant Miller
STSM, GCDO Security Engineering, Member IBM Academy of Technology
Heather Fraser (moderator)
Global Life Sciences & Healthcare Lead, IBM Institute for Business Value. IBM Industry Academy Member
Hemankita Perabathini
Cloud Solution Engineer (IBM)
Hollis Chui
Sr DevOps Engineer – IBM Garage for Technical Solution Acceleration
Ilya Hardzeenka
Category Architect and Technical Delivery Lead
Ingo Averdunk
Distinguished Engineer in Service Management and Site Reliability Engineering (SRE) (IBM)
J Gregory Land (GREG)
Global Industry Leader – Aviation, Hospitality & Travel Related Services Executive Director, Travel & Transportation Global Team
Jane Cheung
Global Research Leader for the Consumer Industry, IBM Institute for Business Value. (IBM)
Jerome Tarte
IBM Executive Architect Application specialty CTO for IBM Cloud Deployment Architects team - IBM Cloud Expert Labs IBM Academy of Technology member
Jianying Hu
BM Fellow, Global Science Leader of AI for Healthcare, and Director of Center for Computational at IBM Research
Lauren Isbell
Integrated Transformation Business Development Executive (IBM)
Mark Buckwell
Executive Security Architect, Cloud Engagement Hub (IBM)
Monica Manni
Research Business Controls, IBM Research - Zurich (IBM)
Nikiforos Chatzopoulos
Associate Partner Global Travel & Transportation & Client Executive Etihad Aviation Group (IBM)
Paolo Sironi
Global Research Leader, Banking and Finance | IBM Institute for Business Value | IBM Industry Academy
Pascal Vetsch
Research Engineer, Security and Hybrid Cloud (IBM)
Rahul Nahar
SIBM CAO, STSM
Ralph Bateman
Distinguished Engineer, Site Reliability Engineering, IBM Cloud
Rama Akkiraju
IBM Fellow, CTO - AI for IT Operations. Master Inventor, IBM Academy Member
Richard Hopkins
IBM Distinguished Engineer, Executive IT Architect
Rima Bose
Advisor
Sabitri Chakraborty
Senior Managing Consultant (IBM)
Saha Mukesh
Security Consultant (IBM)
Sam Lightstone
CTO for AI Strategy & IBM Fellow, IBM Data and AI
Samvedna Jha
Security Architect
Sashank Rao Yaragudipati
Industry Leader for Retail in the IBM India Client Innovation Centre
Stacy Joines
IBM Fellow, IBM Garage and Solution Engineering (IBM)
Stefaan Van Daele
Executive Security Architect
Surya Duggirala
IBM Cloud Engineering Guild Leader (IBM)
Thomas Ward
IBM CDO AI Project Leader, STSM, CSCMP and AoT ALT Member
Vandana Verma
Security Solutions Architect
Yanni Zhang
Senior Software Engineer in IBM Cloud Pak Foundation (IBM)
Additional Resources
Conference Support
Need help registering for this conference or accessing the content? Click the Site Feedback tab at the upper right of any IBM Developer page. A member of the team will be happy to help.