University Guest Lectures
by IBM Academic Ambassadors
Found 44 results
Cybersecurity Operations Law & Policy
This lecture introduces law students to legal aspects of US government cyberspace operations by examining international law and norms and US law and policy. Full spectrum cyberspace operations are conducted by multiple disciplines, each with their own and sometime overlapping …
This lecture introduces law students to legal aspects of US government cyberspace operations by examining international law and norms and US law and policy. Full spectrum cyberspace operations are conducted by multiple disciplines, each with their own and sometime overlapping …
The Smart Electric Power Grid - Internet of Things for the World's Largest Machine
According to the Institute of Electrical and Electronics Engineers, the electric power grid is the largest machine. The increased reliability on electric power for digital life, as well as transportation, has been driving smart grid for the last 15 years. …
Protección de datos y respuesta a incidentes
Los datos son el activo más importante para las organizaciones modernas. Cómo protegerlos y responder de forma ágil a los incidentes de seguridad es clave para mantenerse operativo.
Cómo enfrentar las amenazas de ciberseguridad en el mundo corporativo. Cuáles son las tendencias tecnológicas y cómo IBM puede apoyar en la modernización y protección.
The Two Transformations Driving Cybersecurity Forward Today
Cybersecurity has become one of the most pressing topics for every business today, and it is crucial to understand the two transformations that entities must drive to support core security requirements. This lecture details these two transformations - first, the …
Managing Risks is a daily task for all of us, where we are trying to rationalize and make decisions around the uncertainty of what may or may not happen the future, which is significant to successfully manage such Risks. This …
The evolution of technology has allowed syndicate criminals to become organized criminal “corporations”. In this webinar, Misty interviews cybersecurity expert Mark Wilson as he explains how the evolution of hacking and the cyber world is putting our society at risk.
Link …
IoT & BYOD – The New Security Risks
In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses.
In this recorded webinar, …
Best (free) Badges for Students
Open Badges are official credentials proving you have a certain skill or knowledge, but not quite to the level of a full certification. Employers are increasingly looking for documented skills through Open Badging. But how do you earn Open Badges …
Due to the health of IBM's clients, employees and partners being our primary concern. IBM had taken a new approach to its signature event. Normally an invite only event with world-class speakers in the industry it is now open to …
5 Technologies everyone needs to understand
Technology is now a part of everyone's life but do you understand what those technologies really are? In just 1 hour, Misty explains the basics of 5 key technologies in a way to anyone can understand, even with little technology …
Making your digital transformation a success - Cybersecurity helps reduce digital risk
Cybersecurity is a business subject, not an IT only centric area. In order to reach entreprise digital resilience, embrase sustainable innovation through digital transformation, we must reduce cyber risk and this is the role of cybersecurity experts. But this is …
Topics
Digital ReinventionIndustryIoTRisk ManagementSecurity & PrivacyLecture language
EnglishFrenchThe concepts covered in this presentation will help you examine:
▪ What is cryptography?
▪ Why do we need it?
▪ How do we use encryption to ensure data protection?
▪ How do we use algorithms to encrypt and decrypt data?
▪ What are the …
Easily, confidently access any amount of data, from anywhere. Covered heterogeneous, ubiquitous data, challenges bringing it together in dynamic environments, applicability to analytics and data science, data warehousing (as insufficient), an overview of IBM Data Virtualization, querying hybrid sources with …
Topics
AI / AutomationCloud & DataData Science / Machine LearningSecurity & PrivacyLecture language
EnglishL'Intelligence Artificielle au service de l'humain
Voilà un sujet traité abondamment par les médias, qui nous touche au quotidien, mais tellement vaste que beaucoup peinent à en comprendre vraiment les enjeux. En tant qu'acteur incontournable de l'intelligence artificielle au service des entreprises, souvent en contexte de …
Speeding to Cloud with IBM Cloud Paks
IBM Cloud™ Paks are enterprise-ready, containerized software solutions that give clients an open, faster and more secure way to move core business applications to any cloud. Each IBM Cloud Pak™ includes containerized IBM middleware and common software services for development …
Topics
AI / AutomationCloud & DataData Science / Machine LearningSecurity & PrivacyStorageLecture language
EnglishHindiCyberpsychology is the study of the human mind in its interactions with technology. This talk considers how and why our engagement with technology and social media creates alternative avenues for todays attackers. This talk is an introduction to cyberpsychology and …
Propaganda is a familiar term associated with many famous historical events, yet have we considered the implications of online propaganda when coupled with the ability to refine and target a message based on personalised digital footprints? Computational propaganda has been …
Most everyone needs some skills in technology in order to do their jobs well, from artists using digital rendering to lawyers programming contracts in a blockchain and even school teachers using analytics to understand student needs. Future job roles will …
Creating an End-to-End Identity Management Architecture
One of the most important aspects of IT security is identity management. Controlling who has access to what, when and where is harder than ever as traditional perimeter boundaries soften and employee turnover increases. Single sign-on, LDAP, meta-directories, virtual directories, …
Designing a system involves thinking about how it should work, but in order to design defenses for that system you must first envision how it might fail. In order to do this you have get inside the head of the …
Hacking Everything - The Dark Side of the Internet of Things
With the Internet of Things (IoT), essentially everything becomes a computer. We know that computers can be hacked. This means that everything can be hacked including cars, home appliances, medical devices and more. This session will give examples of IoT …
Leveraging AI for Cybersecurity
In February 2011 an historic event took place. IBM’s Watson computer competed against the two biggest winners of the TV quiz show Jeopardy! — and the Watson won. Since that time artificial intelligence (AI) has found its way into increasingly …
Checking every event will impact the mission-critical-tasks and the company's revenue, on the other hand missing one suspicious event may cause catastrophe to the organization and the market.
I will talk about technique to "find the needle in the haystack", …
Digitale Ethik - Versuch eines Überblicks
Vortrag verfügbar unter: https://video.ibm.com/channel/gnCMwkVyB3A
Immer häufiger taucht der Begriff “Digitale Ethik” in den Schlagzeilen auf. Was ist eigentlich mit Digitale Ethik gemeint? Und warum sollte es mich als ITler und als Privatperson interessieren? Hier ist der Versuch, einen Überblick und …
Hello World - Best practices for your cloud-based database application
Want to build a cloud app with Db2 or another database system? Here are the best practices covering deployment options, security, performance, monitoring and more. Henrik is going to take a look at Kubernetes, Cloud Foundry and serverless Cloud Functions, …
Building your Digital Eminence
Derived from internal IBM course, this one hour interactive session gets students to focus on what they want to be known for, and how that is reflected in their digital presence. Students pair up and research each others internet presence …
Topics
Digital ReinventionLeadership DevelopmentOtherSecurity & PrivacyStart UpsLecture language
EnglishFrenchLet's take a look into tomorrrow's world of technology at three separate scales - planetary, human and nano-tech. For each of them we will take a look at two or three examples of technology that has the potential to change …
Topics
AI / AutomationCloud & DataDigital ReinventionIoTQuantumSecurity & PrivacyLecture language
EnglishIntroduction to Cyber Security
The aims of the lecture are to:
Give an introduction to cyber security principles and risk analysis
Identify important frameworks and standards related to security
Highlight key legal and regulatory requirements affecting security measures
Provide details of security controls and their selection
Discuss the …
The proposed talk provides a practical introduction to the development of interactive security applications, using a specialized framework designed by IBM to help overcome the ever-growing number of cyber-attacks on commercial and government computer infrastructures.
The business problem – securing corporate …
Phishing is one of the early, simple and cost-effective scams in the internet.
Using Social engineering, an attacker aims to acquire sensitive information like passwords and credit card details, for malicious reasons. The attacker is doing so by masquerading as a …
Securing (?) Internet Connections
The Internet – with 2.5 billion users – was never designed to be a secure system. Protocols like DNS or HTTP, the main building blocks of the Internet, were not designed with security in mind. Security protocols and extensions, such …
Trust services with Hardware support (Intel SGX)
The talk will describe new paradigms for securely running code on commodity hardware, with a focus on the Intel SGX technology. I will describe the basic concepts, the main use-cases and deployment challenges.
With the rapid growth in the use of mobile devices and pervasive computing on one hand, and the rise of deep learning on the other, biometric recognition has become an even more exciting field. In this talk, I will give …
Cloud Security - evolving security for new environments
Cloud computing is changing the way we use computing and has the potential for significant economic and efficiency benefits. But the speed of adoption depends on how quickly trust in new cloud models can be established. Some of the growing …
Cloud Security: Who do you trust?
Cloud computing offers to change the way we use computing with the promise of significant economic and efficiency benefits. The speed of adoption depends on how trust in new cloud models can be established. Trust needs to be achieved, especially …
Cyber Attacks–The Bigger Picture
These attacks are almost all carried out by professional criminals (or are state sponsored) and the code used is written by professional programmers to order not spotty teenagers, as used to be the case.
The attack weapon of choice is …
Malware Forensics – Detecting the Unknown
A fairly deep look at forensics from a completely different angle, using different approaches than typically used for traditional digital forensics cases.
How do you find a new piece of malware that isn’t detected by any of the anti-malware solutions and …
Privacy in Mobile Environments
Mobile devices, Personal Digital Assistants (PDAs), and other electronic devices form the part of communication in the ubiquitous environment and interact with each other faultlessly. Mobile devices store various sensitive data in a ubiquitous environment. Hence, having a controlled access …
The lecture begins with a description of the relevance and importance of standards in the IT industry and the place of Security Standards in that picture. The various standards bodies are described, both the treaty organizations including ISO/IEC and ITU-T …
Identity Assertion and Federation
Identity is critical to security because it is required for both authorisation and accountability. We can acquire an identity through authentication but, in distributed systems, we also need to be able to securely propagate identity. This lecture shows how identity …
Governance, Risk and Compliance
This lecture is focused on the security issues that arise from the selection, deployment and operation of large scale IT systems in complex industrial environments. Many large firms spend hundreds of millions every year on global IT systems and governance …
Industry 4.0 - How difficult can it be?
We all know the hype and aspire to the potential that Industry 4.0 can offer. But the reality is that despite showing a lot of promise, for most organisations, achieving this accolade is proving to be quite a challenge.
Apart from …