University Guest Lectures

by IBM Academic Ambassadors

Lecture topic

Lecture language

Lecture duration

Speaker location

Speaker travel

Found 46 results


The path to inherently safer technology: tackling domestic abuse

Imagine being terrified of technology. Knowing that if you leave the home, connect with friends or dare to break even the smallest rule, the all-seeing devices will know - and so will your abuser. As society evolves and technology becomes …


Analyse & renseignement : initiation et présentation

Passé d’une société de l’objet à une société de l’action, le monde se pense aujourd’hui en réseaux, et l’analyse en liens. Cette nouvelle situation conduit à revoir la chaîne du traitement de l’information.
Cette lecture est une réponse à toutes les …


Cybersecurity Operations Law & Policy

This lecture introduces law students to legal aspects of US government cyberspace operations by examining international law and norms and US law and policy. Full spectrum cyberspace operations are conducted by multiple disciplines, each with their own and sometime overlapping …

Topics

LawSecurity & Privacy

Lecture language

English

Cybersecurity Law & Policy

This lecture introduces law students to legal aspects of US government cyberspace operations by examining international law and norms and US law and policy. Full spectrum cyberspace operations are conducted by multiple disciplines, each with their own and sometime overlapping …

Topics

LawSecurity & Privacy

Lecture language

English

The Smart Electric Power Grid - Internet of Things for the World's Largest Machine

According to the Institute of Electrical and Electronics Engineers, the electric power grid is the largest machine. The increased reliability on electric power for digital life, as well as transportation, has been driving smart grid for the last 15 years. …


Protección de datos y respuesta a incidentes

Los datos son el activo más importante para las organizaciones modernas. Cómo protegerlos y responder de forma ágil a los incidentes de seguridad es clave para mantenerse operativo.


Ciberseguridad corporativa

Cómo enfrentar las amenazas de ciberseguridad en el mundo corporativo. Cuáles son las tendencias tecnológicas y cómo IBM puede apoyar en la modernización y protección.


The Two Transformations Driving Cybersecurity Forward Today

Cybersecurity has become one of the most pressing topics for every business today, and it is crucial to understand the two transformations that entities must drive to support core security requirements. This lecture details these two transformations - first, the …


The Savvy Risk Taker

Managing Risks is a daily task for all of us, where we are trying to rationalize and make decisions around the uncertainty of what may or may not happen the future, which is significant to successfully manage such Risks. This …


Cybercrime Inc

The evolution of technology has allowed syndicate criminals to become organized criminal “corporations”. In this webinar, Misty interviews cybersecurity expert Mark Wilson as he explains how the evolution of hacking and the cyber world is putting our society at risk.

Link …


IoT & BYOD – The New Security Risks

In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses.

In this recorded webinar, …


Best (free) Badges for Students

Open Badges are official credentials proving you have a certain skill or knowledge, but not quite to the level of a full certification. Employers are increasingly looking for documented skills through Open Badging. But how do you earn Open Badges …


Replays from IBM THINK 2020

Due to the health of IBM's clients, employees and partners being our primary concern. IBM had taken a new approach to its signature event. Normally an invite only event with world-class speakers in the industry it is now open to …


5 Technologies everyone needs to understand

Technology is now a part of everyone's life but do you understand what those technologies really are? In just 1 hour, Misty explains the basics of 5 key technologies in a way to anyone can understand, even with little technology …


Making your digital transformation a success - Cybersecurity helps reduce digital risk

Cybersecurity is a business subject, not an IT only centric area. In order to reach entreprise digital resilience, embrase sustainable innovation through digital transformation, we must reduce cyber risk and this is the role of cybersecurity experts. But this is …


Cryptography

The concepts covered in this presentation will help you examine:
▪ What is cryptography?
▪ Why do we need it?
▪ How do we use encryption to ensure data protection?
▪ How do we use algorithms to encrypt and decrypt data?
▪ What are the …

Topics

Security & Privacy

Lecture language

EnglishRomanian

Data Virtualization

Easily, confidently access any amount of data, from anywhere. Covered heterogeneous, ubiquitous data, challenges bringing it together in dynamic environments, applicability to analytics and data science, data warehousing (as insufficient), an overview of IBM Data Virtualization, querying hybrid sources with …


L'Intelligence Artificielle au service de l'humain

Voilà un sujet traité abondamment par les médias, qui nous touche au quotidien, mais tellement vaste que beaucoup peinent à en comprendre vraiment les enjeux. En tant qu'acteur incontournable de l'intelligence artificielle au service des entreprises, souvent en contexte de …


Speeding to Cloud with IBM Cloud Paks

IBM Cloud™ Paks are enterprise-ready, containerized software solutions that give clients an open, faster and more secure way to move core business applications to any cloud. Each IBM Cloud Pak™ includes containerized IBM middleware and common software services for development …


Cyberpsychology and Security

Cyberpsychology is the study of the human mind in its interactions with technology. This talk considers how and why our engagement with technology and social media creates alternative avenues for todays attackers. This talk is an introduction to cyberpsychology and …

Topics

Security & Privacy

Lecture language

English

Computational Propaganda

Propaganda is a familiar term associated with many famous historical events, yet have we considered the implications of online propaganda when coupled with the ability to refine and target a message based on personalised digital footprints? Computational propaganda has been …

Topics

Risk ManagementSecurity & Privacy

Lecture language

English

Technology for every Degree

Most everyone needs some skills in technology in order to do their jobs well, from artists using digital rendering to lawyers programming contracts in a blockchain and even school teachers using analytics to understand student needs. Future job roles will …


Creating an End-to-End Identity Management Architecture

One of the most important aspects of IT security is identity management. Controlling who has access to what, when and where is harder than ever as traditional perimeter boundaries soften and employee turnover increases. Single sign-on, LDAP, meta-directories, virtual directories, …

Topics

Security & Privacy

Lecture language

English

Secure Thinking

Designing a system involves thinking about how it should work, but in order to design defenses for that system you must first envision how it might fail. In order to do this you have get inside the head of the …

Topics

Security & Privacy

Lecture language

English

Hacking Everything - The Dark Side of the Internet of Things

With the Internet of Things (IoT), essentially everything becomes a computer. We know that computers can be hacked. This means that everything can be hacked including cars, home appliances, medical devices and more. This session will give examples of IoT …

Topics

IoTSecurity & Privacy

Lecture language

English

Leveraging AI for Cybersecurity

In February 2011 an historic event took place. IBM’s Watson computer competed against the two biggest winners of the TV quiz show Jeopardy! — and the Watson won. Since that time artificial intelligence (AI) has found its way into increasingly …

Topics

AI / AutomationSecurity & Privacy

Lecture language

English

Securing the Crown Jewels

Checking every event will impact the mission-critical-tasks and the company's revenue, on the other hand missing one suspicious event may cause catastrophe to the organization and the market.
I will talk about technique to "find the needle in the haystack", …

Topics

Security & Privacy

Lecture language

EnglishHebrew

Digitale Ethik - Versuch eines Überblicks

Vortrag verfügbar unter: https://video.ibm.com/channel/gnCMwkVyB3A

Immer häufiger taucht der Begriff “Digitale Ethik” in den Schlagzeilen auf. Was ist eigentlich mit Digitale Ethik gemeint? Und warum sollte es mich als ITler und als Privatperson interessieren? Hier ist der Versuch, einen Überblick und …


Hello World - Best practices for your cloud-based database application

Want to build a cloud app with Db2 or another database system? Here are the best practices covering deployment options, security, performance, monitoring and more. Henrik is going to take a look at Kubernetes, Cloud Foundry and serverless Cloud Functions, …


Building your Digital Eminence

Derived from internal IBM course, this one hour interactive session gets students to focus on what they want to be known for, and how that is reflected in their digital presence. Students pair up and research each others internet presence …


The Future of Technology

Let's take a look into tomorrrow's world of technology at three separate scales - planetary, human and nano-tech. For each of them we will take a look at two or three examples of technology that has the potential to change …


Introduction to Cyber Security

The aims of the lecture are to:
Give an introduction to cyber security principles and risk analysis
Identify important frameworks and standards related to security
Highlight key legal and regulatory requirements affecting security measures
Provide details of security controls and their selection
Discuss the …

Topics

Security & Privacy

Lecture language

English

QRadar Apps

The proposed talk provides a practical introduction to the development of interactive security applications, using a specialized framework designed by IBM to help overcome the ever-growing number of cyber-attacks on commercial and government computer infrastructures.

The business problem – securing corporate …

Topics

Security & Privacy

Lecture language

EnglishHebrew

How Do You Like Your Phish?

Phishing is one of the early, simple and cost-effective scams in the internet.
Using Social engineering, an attacker aims to acquire sensitive information like passwords and credit card details, for malicious reasons. The attacker is doing so by masquerading as a …

Topics

Security & Privacy

Lecture language

EnglishHebrew

Securing (?) Internet Connections

The Internet – with 2.5 billion users – was never designed to be a secure system. Protocols like DNS or HTTP, the main building blocks of the Internet, were not designed with security in mind. Security protocols and extensions, such …

Topics

Security & Privacy

Lecture language

EnglishHebrew

Trust services with Hardware support (Intel SGX)

The talk will describe new paradigms for securely running code on commodity hardware, with a focus on the Intel SGX technology. I will describe the basic concepts, the main use-cases and deployment challenges.

Topics

Security & Privacy

Lecture language

EnglishHebrew

A deep dive into Biometrics

With the rapid growth in the use of mobile devices and pervasive computing on one hand, and the rise of deep learning on the other, biometric recognition has become an even more exciting field. In this talk, I will give …

Topics

Security & Privacy

Lecture language

EnglishHebrew

Cloud Security - evolving security for new environments

Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing …

Topics

Security & Privacy

Lecture language

English

Cloud Security: Who do you trust?

Cloud computing offers to change the way we use computing with the promise of significant economic and efficiency benefits. The speed of adoption depends on how trust in new cloud models can be established. Trust needs to be achieved, especially …

Topics

Security & Privacy

Lecture language

English

Cyber Attacks–The Bigger Picture

These attacks are almost all carried out by professional criminals (or are state sponsored) and the code used is written by professional programmers to order not spotty teenagers, as used to be the case.

The attack weapon of choice is …

Topics

Security & Privacy

Lecture language

English

Malware Forensics – Detecting the Unknown

A fairly deep look at forensics from a completely different angle, using different approaches than typically used for traditional digital forensics cases.

How do you find a new piece of malware that isn’t detected by any of the anti-malware solutions and …

Topics

Security & Privacy

Lecture language

English

Privacy in Mobile Environments

Mobile devices, Personal Digital Assistants (PDAs), and other electronic devices form the part of communication in the ubiquitous environment and interact with each other faultlessly. Mobile devices store various sensitive data in a ubiquitous environment. Hence, having a controlled access …

Topics

Security & Privacy

Lecture language

English

Security Standards

The lecture begins with a description of the relevance and importance of standards in the IT industry and the place of Security Standards in that picture. The various standards bodies are described, both the treaty organizations including ISO/IEC and ITU-T …

Topics

Security & Privacy

Lecture language

English

Identity Assertion and Federation

Identity is critical to security because it is required for both authorisation and accountability. We can acquire an identity through authentication but, in distributed systems, we also need to be able to securely propagate identity. This lecture shows how identity …

Topics

Security & Privacy

Lecture language

English

Governance, Risk and Compliance

This lecture is focused on the security issues that arise from the selection, deployment and operation of large scale IT systems in complex industrial environments. Many large firms spend hundreds of millions every year on global IT systems and governance …

Topics

Security & Privacy

Lecture language

English

Industry 4.0 - How difficult can it be?

We all know the hype and aspire to the potential that Industry 4.0 can offer. But the reality is that despite showing a lot of promise, for most organisations, achieving this accolade is proving to be quite a challenge.

Apart from …