Think 2018 presents...

Security and the $150B industry no one is talking about

Share this post:

You’ll need to register using an IBMid to personalize your experience. If you don’t have an IBMid, you will create one after clicking a registration option.

Think 2018 is a first-of-its-kind IBM conference where thinkers like you come together to innovate and educate—making the world of business work smarter. Together we will explore cloud and data, AI, blockchain, security, and Infrastructure discovering partnerships that unlock business and human potential.

In the second of our 4 week series we first look at security and how our attendees will experience this game changing technology at Think 2018.

What does security mean at IBM? Security at IBM helps you evolve your business continuity and disaster recovery plans for the future with the power of AI, collaboration, automation, orchestration and cloud.

IBM brings you the experts in security so you can learn and experience it for yourself. Read on to learn about where you can find security at Think 2018.

 

Contents


The $150B industry no one is talking about
Featured Security sessions
Security speakers
Security at Think Academy
Experience Security
Next Steps – There’s so much more to Think

 

The $150B industry no one is talking about

How do you fight something you can’t see, and may not even know is right there in front of you?

This question has fueled horror stories for centuries. New horrors are emerging in real life as we—both as a society and within businesses and industries—discuss cyber crimes and how we can safeguard everything from competitive data to individual identity. But what about the hidden crimes that don’t make the dinner table or boardroom discussions? What about the massive crimes you can’t even fathom, let alone see?

There is a $150B industry operating in secrecy. It’s an industry that runs on fear and desperation and even accelerates in the face of laws and regulations. This silently thriving line of work is human trafficking, and the more taboo we make the topic, the stronger this industry grows.

Let’s start with the basic definition.

According to STOP THE TRAFFIK, an organization pioneering human trafficking awareness and prevention efforts, human trafficking is the recruitment or movement of persons, through coercion, deception, or force, for the purpose of exploitation. The coercion, deception, or force is often not directed at the individual being detained but rather some agent on the individual’s behalf, and the nature of the exploitation can vary broadly.

Among the shocking and tragic stories shared through STT is the tale of Sunni, age 7, and Wihini, age 9. One day they didn’t show up to their daycare centre in India. It was discovered that their father had agreed to sell them both for £10. He never received the money, and he never saw his children again. Their whereabouts are still unknown. One persuasive conversation convinced this man in a moment of weakness that £10 was worth more than his son and daughter. This is human trafficking.

The scariest thing about this practice is how much we don’t know about it. We don’t yet have a full picture of the strategies or internal structures among its perpetrators. We don’t even yet know the scale of its impact.

Thanks to the work of STOP THE TRAFFIK and its Centre for Intelligence-led Prevention, as well as the latest advances in security technologies, we have a new hope for putting an end to these real-life horrors.

It takes world-leading analytical capabilities to unlock the mysteries that can bring these well-organized crimes into the light, and IBM is proud to be a leading partner in these efforts. IBM Security is helping build a detailed intelligence map of human trafficking networks around the world. Using IBM Security solutions on the cloud helps grow these insights even more efficiently, hosted on the IBM SoftLayer Cloud as well as IBM i2 Analyst’s Notebook for data management and network visualizations. And, most importantly, individuals around the world with access to smartphones can use the STOP APP to add to these critical data sets. It’s a worldwide community effort to fight in the war against this injustice.

Raise your voice, stay informed, and learn what else you can do to combat human trafficking at stopthetraffik.org. Download the STOP smartphone app, share this story, spread the word, and help put an end to this silent, illicit industry.

When we focus on community, we get closer to putting an end to the silos that make it easy for these shameful crimes to hide. Let’s work together and find new ways to combat threats to the security of our society with the same tools we’re using to safeguard our business.

For more big ideas and discussions around how security can help us all put smart to work for a better world, join us at Think 2018. As part of the Security & Resiliency community, you’ll learn more about amazing advances in technology with a smart, caring group of business leaders and thinkers like you. Together, we can learn more about what the latest advances in security can do to help make the world safer for everyone.

 

Featured Security sessions

In a world where IT is your business and digital transformation is essential for you to compete, get expert advice from a trusted partner to help you prevent the if, and to respond and recover quickly from the when. Listed here are just some of the comprehensive sessions that can help you master security at Think. Use the Watson Session Explorer to add any of these talks to your Think 2018 agenda.

Explore with Watson Session Expert

Combatting Tomorrow’s Cyber-Criminals

Session #8298

The financial services sector remained one of the prime targets of cybercriminals in 2017, as sophisticated attacks escalated and fraud losses rose. As banks adapt to these new threats, they must remain focused on meeting the demands of their customers by providing the latest forms of technology without compromising their user experience. Join this session to gain unique insights into the evolving threat landscape and understand how these new cyber attacks are impacting organizations around the world. You can also learn about new IBM Trusteer innovations that are designed to protect your organization against financial fraud, deliver a secure customer experience across your digital channels and protect your digital apps.

Nationwide’s Perspective on Protecting Data

Session #5249A

Your company’s confidential data is stored in many locations, on-site and in the cloud. Your job is to protect that data wherever it resides. Regulators and auditors want you to know where all your confidential data is stored and how you are protecting it against threats. Add the fact that more applications and data are moving to the cloud, and the risk becomes even more daunting. A look at the headlines shows the importance of protecting data is greater now than it has ever been for any company. In this session, Nationwide, a Fortune 100 company, will discuss how they view this problem, how to prioritize the controls to implement, and what technologies they are looking at in the future to protect their confidential data.

 

Cyber Resilience for Enterprise Data—Protection from Logical Corruption

Session #1551

Today’s headlines frequently feature stories about attacks on enterprise data from ransomware, malware, insider threats or other corruption/destruction of data. This is a significant concern for many large organizations and to the associated industry regulatory bodies. Traditional high availability and disaster recovery (HA/DR) solutions provide no protection from these types of events. This session will discuss how IBM is responding to the phenomenon focusing on the concepts and solutions to protect and recover the core enterprise data from logical corruption.

Does Security Travel with your Data? Protect it with data encryption

Session #3020

IBM provides comprehensive data encryption capabilities to help protect your data wherever it resides—on-premises, in the cloud, in multiple clouds, or in hybrid environments. This session will focus on IBM Multi-Cloud Data Encryption, specifically for cloud and hybrid data protection. Learn how to configure policies for file and folder encryption, as well as how to deploy agents to encrypt and decrypt data.

 

Skip the Anxiety Attack When Building Secure, Containerized Apps

Session #4730

As a developer, security is something you know you have to handle. But that doesn’t mean you have to figure it all out yourself. Application security complexity can be reduced if planned into development from the start. In this talk, experts from the IBM Container Service team will discuss what it means to build build and run a secure application, and how Kubernetes-as-a-Service is the ideal platform. We will discuss how to achieve a secure Kubernetes cluster, how handle network security, and how to build security awareness into you CI/CD pipeline. This talk will also discuss how the IBM Container Service provides this secure platform automatically, and will cover advanced capabilities such as Vulnerability Advisor.

Demystifying Security in the Cloud

Session #4779

Cloud technology presents opportunities for you to radically transform business practices, including security. Leading businesses across various industries are tasked with protecting data, gaining visibility, and achieving regulatory compliance when moving workloads to the cloud. A powerful capability of IBM Cloud is its unique, hardware-rooted security features created in partnership with Intel. Last year, we announced IBM Cloud Secure Virtualization; this session will include the announcements of two exciting new Cloud Security offerings enabled through this partnership. Join IBM and Intel to discuss how you can build security into your cloud strategy.

 


Security speakers

Our visionary speakers are overcoming society’s most daunting challenges with a mix of technical prowess and real-world insights — and they’ll show you how to do the same.

Think with the world’s brightest

Marc van Zadelhoff
General Manager, IBM Security

marc-van-zadelhoffMarc van Zadelhoff is the General Manager, IBM Security, one of the largest enterprise security companies in the world. With 20 years experience in cyber security, Mr. van Zadelhoffworks with clients across industries to help them develop their security strategies and determine the best technologies to meet their needs.

With ongoing disruption and outages from cyber attacks, human error, and natural disasters, organizations must shorten response and recovery time, protect their data and devices, and address/bridge the enormous skills gap required to stop cyber attacks and disruptions. While it feels like we are at a moment of crisis, IBM Security General Manager Marc van Zadelhoff and IBM Vice President of Resiliency Services Mike Errity are confident that we can win this asymmetrical battle with three main steps: Mastering security and resiliency fundamentals, using artificial intelligence to change the game and being prepared.

Mike Errity
Vice President IBM Resiliency Services, North America

mark-errityMike Errity is Vice President of IBM Resiliency Services in North America for IBM Global Technology Services. He manages the consulting, sales and delivery team implementing industry-leading service processes to create client value and earn loyalty. Mike and his team work with clients to design and deploy solutions for business resiliency and to mitigate operational risk.

With ongoing disruption and outages from cyber attacks, human error, and natural disasters, organizations must shorten response and recovery time, protect their data and devices, and address/bridge the enormous skills gap required to stop cyber attacks and disruptions. While it feels like we are at a moment of crisis, IBM Security General Manager Marc van Zadelhoff and IBM Vice President of Resiliency Services Mike Errity are confident that we can win this asymmetrical battle with three main steps: Mastering security and resiliency fundamentals, using artificial intelligence to change the game and being prepared.

 

Dr. John Graham-Cumming
Chief Technical Officer, CloudFlare

dr-john-cummingThe practical realities of the modern internet have forced malicious users to shift their strategy in performing online attacks. As a result, there is a greater need for security thought leaders to innovate in combating malicious web activity. Dr. John Graham-Cumming, CTO of Cloudflare, discusses the latest efforts to protect web traffic from increasingly sophisticated attacks.

John Graham-Cumming received his Ph.D. in computer security from Oxford University. A peripatetic programmer, he has worked in Silicon Valley, New York, the UK, Germany and France. In 2004, his open source POPFile program won a Jolt Productivity Award. He has authored two books: The Geek Atlas, a travel companion for math and science history enthusiasts; and GNU Make Unleashed, a guide for programmers. In 2009, he spearheaded a successful petition to the British Government demanding an apology for its persecution of Alan Turing for his homosexuality. His personal blog was rated among the “top 30 science blogs” by The Times in February 2010. And in October, 2010, he founded an organization dedicated to build Charles Babbage’s famous analytical engine.

 


 

Security at Think Academy

$1000s worth of value in training, certifications, labs, and expert talks. Become an expert and learn about the technology that is changing the way the world works. Learn more about some of our highlighted labs below:

Reimagine learning with Think Academy

No Place to Hide: Applying the Power of Advanced Analytics to Network Data for Deeper Threat Insight

Session #8443

Unlocking the full potential of advanced analytics requires deep network insights: a combination of the right data, sufficient visibility into the details, and context that we care about from a security perspective. Learn how to make the most of packet capture data and deep packet inspection with advanced analytics to conduct deep analysis in real time with the IBM QRadar family of products.

Does Security Travel with your Data? Protect it with data encryption

Session #3020

IBM provides comprehensive data encryption capabilities to help protect your data wherever it resides—on-premises, in the cloud, in multiple clouds, or in hybrid environments. This session will focus on IBM Multi-Cloud Data Encryption, specifically for cloud and hybrid data protection. Learn how to configure policies for file and folder encryption, as well as how to deploy agents to encrypt and decrypt data.

 

Suspicious Activity to Suspended Account in Under a Minute: Stop Insider Threats with Automation

Session #8438

Are your security analysts and IAM teams speaking different languages? Can you see identity-related threats in your SIEM, and automate the appropriate response within your IAM solutions? In this hands-on lab, learn how you can use user behavior analytics to detect and stop insider threats. You’ll walk away with tips on how to configure your IAM and SIEM solutions to suspend accounts or challenge access when risk scores are high. Users of IBM Resilient, QRadar, Identity Governance and Intelligence, or IBM Security Access Manager will benefit from this hands-on training and have the opportunity to practice building response scripts to a variety of different risky user behaviors.

 


 

Experience Security

The Disruption Dome

How prepared are you to make the next key security decision? The Disruption Dome on the Security & Resiliency Campus is your place to experience first-hand those critical turning points for organizations dealing with key issues from the perspective of business leaders like CISOs, CIOs, CEOs, Risk and Compliance Officers, SOC Directors, and IT Directors. Come see how companies can prepare their security and IT operations for “boom moments” from compliance audits to data breaches. Find out what it takes to prepare your security program when you decide it’s time to move to the cloud, and even how to build in security from the start of a digital transformation. Learn what it takes to be ready before the boom happens, and how to respond after it does.

 

Next Steps – There’s so much more to Think

Let’s keep this conversation going!
  • Register for Think 2018 and learn more about security and other exciting new technologies in Las Vegas this March.
  • If you’re already registered for Think 2018, sign in with your IBMid to explore more sessions and certifications with the Watson Session Expert app.

Senior Copywriter

More Think 2018 presents... stories

Improving food safety with the Internet of Things

Think 2018 is a first-of-its-kind IBM conference where thinkers like you come together to innovate and educate—making the world of business work smarter. Together we will explore cloud and data, AI, blockchain, security, and Infrastructure, discovering partnerships that unlock business and human potential. In the third of our 4-week series, we’re looking at the Internet […]

Continue reading

Up close with blockchain technology

Think 2018 is a first-of-its-kind IBM conference where thinkers like you come together to innovate and educate—making the world of business work smarter. Together we will explore cloud and data, AI, blockchain, security, and Infrastructure discovering partnerships that unlock business and human potential. In the first of our 4 week series we first look at […]

Continue reading