IBM- Security and Privacy services - Experts & Thought Leaders
Latest IBM- Security and Privacy services news & announcements
DigiCert, a major provider of digital trust, announced the speaker lineup for its World Quantum Readiness Day event, set to take place virtually on September 10, 2025. The event will bring together top voices in quantum computing, cryptography, and cybersecurity to provide actionable guidance on preparing for the quantum era. “Quantum computing is reshaping the foundation of digital security, and it’s essential that organizations understand and prepare for this next chapter,” said Amit Sinha, CEO of DigiCert. “We are honored to welcome such a distinguished group of experts to help advance industry understanding and readiness for a quantum future.” Quantum preparedness World Quantum Readiness Day was created to urge organizations to assess their quantum preparedness, accelerate PQC adoption, and equip themselves against future threats. This year’s event will give attendees the knowledge they need to build a roadmap to become quantum-ready. Guest panelists for World Quantum Readiness Day 2025 include: Dr. Taher Elgamal, Cryptographer, Entrepreneur, and the “Father of SSL,” Partner at Evolution Equity Partners Dr. Lily Chen, Mathematician and NIST Fellow, NIST Panos Kampanakis, Principal Security Engineer, AWS Richard Kisley, Chief Engineer, IBM HSM Jeff Stapleton, PQC Researcher, Wells Fargo and X9F4 Cybersecurity & Cryptography Chair William Whyte, Sr. Director, Technical Standards, Qualcomm Tom Patterson, Managing Director for Emerging Technology Security, Accenture Colin Soutar, Global Quantum Cyber Readiness Lead, Deloitte Martin Reilly, Digital Identity Offering Manager, DXC Technologies Dr. Jim Goodman, CTO and Co-founder, Crypto4A Konstantinos Karagiannis, Director of Quantum Computing Services, Protiviti; Host of The Post-Quantum World podcast Blair Canavan, Director, Alliances - PKI & PQC Portfolio, Thales Luke Valenta, Research Engineer, Cloudflare The event will be hosted by John Furrier, Cofounder & CEO of SiliconANGLE, with DigiCert moderators and speakers including Dr. Amit Sinha, CEO; Lakshmi Hanspal, CTrO; Deepika Chauhan, CPO; Jeremy Rowley, SVP and Digital Trust Strategist; Tim Hollebeek, VP of Industry Standards; Kevin Hilscher, Sr. Director of Product Management; Corey Bonnell, Industry Development Strategist; and Shane Kelly, Principal Crypto Architect. post-quantum cryptography DigiCert again will be honoring the winner and finalists of the 2025 Quantum Readiness Awards, which recognize organizations that have taken bold steps to become quantum-ready. These pioneers exemplify excellence in planning, executing, and advocating for post-quantum cryptography (PQC) adoption. Winners will be announced on September 25, 2025. Deadline to submit nominations is 11:59 p.m. PT on August 29, 2025.
artius.iD, the global pioneer in secure, self-managed identity and decentralized ID management, has appointed Burton M. Goldfield, former President and CEO of TriNet Group Inc. (NYSE: TNET), to its Board of Strategic Advisors. Bringing more than three decades of cutting-edge technology expertise to the business, Goldfield will provide high-level strategic advice to artius.iD as it continues to rapidly scale its cross-sector digital identity and cybersecurity offering to multinational corporations and small- and medium-sized businesses (SMBs). Prior roles of Goldfield A renowned business executive, Goldfield brings more than 25 years of expertise in technology A renowned business executive, Goldfield brings more than 25 years of expertise in technology. He most recently served as President and CEO of TriNet Group for 15 years, steering the company to become a premier provider of comprehensive human resources solutions for more than 22,000 customers of small and medium-sized businesses (SMBs). Prior to TriNet, Goldfield held pivotal leadership roles at companies including Rational Software (RATL), Hyperion Solutions (HYSL), and IBM Corporation (IBM). He holds a bachelor’s degree in biomedical engineering from Syracuse University and an MBA from Villanova University. Demand for digital identity solutions Goldfield joins the Board of Strategic Advisors at a time when SMBs are facing increasingly sophisticated and multidimensional cybersecurity threats, with HR systems being an especially popular attack vector. His deep understanding of the small- and medium-sized business ecosystem will put artius.iD in an unrivaled position to tap into the accelerating demand for digital identity solutions among SMBs. Michael Marcotte, founder, Chairman, and CEO of artius.iD, said: "This is a pivotal appointment for artius.iD as we continue to pursue our strategic plan, and I'm thrilled to welcome Burton to our Board of Strategic Advisors. Our collaboration spans decades, including impactful initiatives on SlingTV, and is built on mutual trust and admiration." Decentralized ID management solutions Goldfield joins the Board of Strategic Advisors at a time when SMBs are facing sophisticated Marcotte added: "As a steadfast advocate and champion for SMBs and entrepreneurs, Burton has a profound understanding of the challenges companies face in safeguarding customer and employee data. His expertise and insight will be invaluable as artius.iD continues to deliver groundbreaking solutions to address these critical needs.” Burton Goldfield, Strategic Board Advisor at artius.iD, added: "artius.iD’s advanced quantum encryption resilience and decentralized ID management solutions provide SMBs with the confidence needed to safeguard their customer and employee relationships." Advanced groundbreaking software Goldfield added: "This transformative technology is akin to the advanced groundbreaking software tools created by Rational for the Department of Defense and Hyperion’s breakthrough with Essbase using OLAP for analytics." "SMBs are the driving force behind the U.S. economy, and it is vital that we continue to support their success. I'm eager to help bring this transformative technology to the organizations that need it most."
A new entry in the cyber-physical security marketplace making its first public introduction, MERON is demonstrating a groundbreaking new solution for Physical Identity and Access Management (PIAM) branded PIAM+ here at GSX 2024 in booth 1955. MERON is launched by industry veterans Sharad Shekar and Imran Rana with the mission to usher in the next generation of AI-driven PIAM and Security Incident Management that overcomes the longstanding shortfalls of legacy solutions. Robust PIAM solution Meron is cloud agnostic and runs on cloud infrastructure like Amazon, Oracle, Microsoft, Google, and IBM MERON PIAM+ leverages the latest advancements in data science, artificial intelligence (AI) and micro-services architecture to deliver a seamlessly integrated, highly versatile and comprehensive PIAM and Incident Management application for on-prem or cloud deployment. Meron is cloud agnostic and runs on cloud infrastructure like Amazon, Oracle, Microsoft, Google, IBM, Alibaba, etc. “During the course of several consultation projects with pioneering companies over the past few years, it became quite clear that organizations with large numbers of employees and/or contracted workers are seeking a better, more robust PIAM solution that goes beyond legacy solutions,” said Sharad Shekhar, Principal at MERON. Creation of MERON technology Shekhar added: “This led to many discussions with longstanding partners and developers around the globe over the course of last two to three years, and the creation of MERON technology last year and public release of our new PIAM+ solution which we are debuting here at GSX 2024.” MERON PIAM+ delivers a comprehensive approach to managing identities over their entire lifecycle and securing physical access. It fully integrates identity verification, access control, incident management and security policies to ensure only authorized individuals can enter specific areas they have clearance to enter. Innovative PIAM+ solution MERON PIAM+ denotes itself from legacy applications by integrating advanced AI technologies This innovative PIAM+ solution streamlines the process of granting, monitoring, and revoking access, enhancing security and compliance while reducing the risk of unauthorized entry. By centralizing and automating these functions, MERON PIAM+ helps organizations protect their assets, ensure regulatory compliance and maintain more secure environments. MERON PIAM+ distinguishes itself from legacy applications by integrating advanced AI technologies, automation and analytics to provide enhanced security, efficiency, and adaptability. Launch of MERON PIAM+ The unique PIAM solution employs modern microservices-based platform architecture – a revolutionary approach that breaks down applications into smaller, independent services, each focused on a specific function resulting in unlimited scalability with improved system maintainability, support and upgradability. “We have already engaged with several large organizations who have expressed extreme interest in MERON PIAM+, and we are currently collaborating with select high-profile systems integrators with customer bases of large organizations,” continued Shekhar. “We are also now looking to further expand our business network, as well as our team of identity and access management technology and sales experts to further support the launch of MERON PIAM+.”
Insights & Opinions from thought leaders at IBM- Security and Privacy services
Enterprise security directors often count on an integration firm to handle jobs ranging from day-to-day activities to long-term, technology-laden projects. However, before entering a relationship, you must know what's reasonable to expect from an integrator – as not all are created equal. Here are some tips that might make the selection process easier. Completing comprehensive classwork An integrator's experience working in an enterprise environment is an obvious consideration. Ideally, that experience fits well with your business. Any enterprise experience is a plus, but local, state, and federal regulations create precise yet very different rules for securing a utility instead of a hospital. That's also true for university campuses, manufacturing facilities, and many other operations. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing Look for certifications indicative of an integrator's commitment to staying on top of industry changes. Organizations such as ASIS International and the Security Industry Association offer certifications showing an integrator's team members have mastered security principles and skills. Many manufacturers offer certifications awarded after completing comprehensive classwork and testing. Also, ensure an integrator sells and services equipment that integrates with your current security systems. Using multiple systems for the same function is less efficient. Project update meetings Go beyond an integrator's slick brochures and websites to ask tough questions about previous experience. How would the integrator handle a hypothetical situation in one of your facilities? Ask the integrator if there will be one project manager for all jobs. And ensure that person handles all interactions with security subcontractors. Ask if the integrator provides regularly scheduled project update meetings. It's frustrating to wonder how your project is progressing. Ask if the integrator's team can work during the hours and days that result in the least interference to your daily operations. Ask for onsite system training to save time and eliminate travel costs. Gathering sensitive data Look for an integrator with proven experience working with an enterprise IT department A malfunctioning component may be more than an inconvenience – it may be a severe security threat. You need to know how quickly your integrator can respond when things go wrong. Ask about available service plans. And consider the embedded staff approach in which the integrator places employees on your site full time to handle day-to-day and emergency activities. Much of the security equipment – video, access control, intercoms, visitor management, and more – is wireless and dependent upon networks operated by your IT department. Network-based devices provide more opportunities for hackers to gather sensitive data or cause critical equipment to malfunction. Don't trust your security operations with an Integrator unfamiliar with at least basic cybersecurity principles. Look for an integrator with proven experience working with an enterprise IT department. At a minimum, ensure the integrator can set and change security device IP addresses and port locations. Certifications from providers such as Cisco, Microsoft, and IBM indicate an understanding of various IT technologies. Potential security partners Knowledgeable integrators work with the well-encrypted Open Supervised Data Protocol (OSDP), now an internationally recognized standard. Run from any integrator who suggests operating an access control system with used Wiegand technology offering no encryption between cards and readers. It's easy for hackers to capture data and clone a working credential. Technology moves at a rapid pace. Your modern system of a few years ago may be long-of-tooth. You need an integrator capable of bringing new and innovative ideas to the table. You want an integrator who conducts in-house testing of new products, not relying solely on a manufacturer's claims. You want an integrator capable of thinking outside the box to solve a complex security problem. These ideas are just a start in assessing an integrator's value to your enterprise operation. However, they will help you sort through potential security partners to find one that best meets your needs.
Keynote speakers will kick off ISC West Day 1 and Day 2. Keynote sessions are open to anyone, and ISC West organisers look for speakers with broad-based appeal, either from the government or related to security strategies, standards and measures. Timely and newsworthy topics are included as a means of educating attendees on the best way to protect their own facilities. On the first day of the exhibition, April 10 at 8:30 a.m., the Keynote Speaker will be William Bryan of the Department of Homeland Security (DHS). As science and technology advisor for DHS, Bryan leads research, development, innovation and testing and evaluation activities. An Army veteran with 17 years of active military service and three years in the Virginia National Guard, Bryan brings a wealth of experience gained from multiple leadership roles in the U.S. Department of Energy (DOE) and Department of Defense (DoD). Safeguarding Public At Stadium Butler has been responsible for the personal security of Prime Ministers, Presidents, and members of the British Royal FamilyThe Day 2 Keynote, Thursday at 8:30 a.m., will be given by Russ Butler, Vice President of Security for the San Francisco 49ers and Levi’s Stadium. A former Scotland Yard Police Officer, Butler led a team of specially trained and equipped police officers tasked in the 1980s with safeguarding the public at soccer matches throughout the UK during the height of organized soccer violence. He was also a SWAT Team Leader for Scotland Yard, and has been responsible for the personal security of Prime Ministers, Presidents, and members of the British Royal Family. Butler has been involved in planning and executing notable events such as Super Bowl 50, ‘WrestleMania’ and this year’s College Football Championships. The ISC West conference program, provided by the Security Industry Association (SIA) and branded SIA Education@ISC, is expanding this year to 85-plus sessions, with something for everyone, whether they are an end user, dealer/installer, consultant, or are focused on a specific vertical market. The conference program speaks to every audience segment at the show. Enhancing Organization’s Cybersecurity Attendees will leave the session with a self-created model including concrete recommendations to enhance their organization’s cybersecurityCybersecurity will be a bigger topic than ever, and among the new speakers will be Johna Johnson, CEO and Founder of Nemertes Research, whose session will enable end user participants to quickly and accurately ‘score’ the maturity of their cybersecurity initiatives. Session participants will use handouts to rate themselves and their current success based on operational metrics, deployment of key ‘bellwether technologies’, and organizational and operational best practices. Attendees will leave the session, planned for April 9 at 10:15 a.m., with a self-created model including concrete recommendations to enhance their organization’s cybersecurity. Another new speaker will be Hector Alvarez, President of Alvarez Associates, a specialist in workplace violence prevention. His presentation, April 9 at 2:45 p.m., is geared towards security, safety, risk managers and HR staff who are new to threat management/workplace violence, or experienced professionals who can benefit from reviewing the foundational steps. Addressing Threatening And Concerning Behavior The sessions, on April 10 and 11, provide exhibitors an opportunity to educate and provide demonstrations to their customer base on new technologiesReal-world vignettes will be reviewed, including those with both negative and positive outcomes. The session will enable attendees to recognize the warning signs of individuals on the pathway towards violence, and to identify a range of intervention and response options to address threatening and concerning behavior. Free Vendor Solution Sessions are another popular feature of the ISC West conference program. The sessions, on April 10 and 11, held in meeting rooms near the exhibit hall, provide ISC West exhibitors an opportunity to educate and provide demonstrations to their customer base on new technologies. They are free to any ISC West badgeholders. Some of the sessions attract large attendance, and preregistration is provided. Presenting companies include Axis Communications, StarLink Fire, FireLink FACP, Hikvision, Intel, Verkada, and IBM.
Milestone Systems is embracing artificial intelligence and deep learning in a big way at this week's yearly Milestone Community Days (MIPS 2018) in Las Vegas. The Danish company's theme is "Creating an Intelligent World," and Milestone's stated goal is to make "the Milestone community part of every surveillance installation in the world." Science Fiction Becomes Reality In a presentation on opening day, Milestone CSMO Kenneth Hune Petersen pointed to the 2002 movie The Minority Report as highlighting a variety of gadgets and systems that seemed futuristic at the time but are now perfectly possible, and in some cases outdated. Movies have previously highlighted gadgets and systems that were futuristic, but are now perfectly possible, or outdated "If we dare to dream together we can make this a better world," says Petersen. "Through AI and machine learning, we can help define tomorrow. There's no doubt about it: There is a massive business opportunity for us in artificial intelligence." Despite all the talk about artificial intelligence, only about 0.5 percent of all the data in the world has currently been analyzed or used, says Peterson. "Our open platform technology is the foundation for intelligent video systems and our partners have the expertise and infrastructure needed to reach the next frontier in intelligent video solutions," said Bjørn Skou Eilertsen, Milestone Systems CTO. "Together, we can provide unlimited solutions for our customers." Deeper Integration And Broader Coverage Expanding the Milestone community this year has included the addition of 1,000 new models of supported hardware devices; there are currently more than 7,000 models supported. Milestone is also pursuing broader coverage of installations through their partners, with deeper integration of functionality, and by deepening existing relationships with customers. ‘Creating an intelligent world’ includes deep learning and lots of video systems, says Milestone at their annual conference Under new agreements, hardware partners such as Dell EMC and BCDVideo now provide XProtect Essential+ software pre-loaded on servers they sell. The focus at MIPS 2018 on AI included a presentation by Tanmay Bakshi, the "world's youngest IBM coder" and TED Talk speaker, at 14 years old. The prodigy, who has been coding since the age of 4, has worked with IBM and other companies on a variety of AI-related projects. Using deep learning with video is currently limited because so much video is unlabelled and unstructured In his MIPS 2018 keynote speech, Bakshi traced the development of AI through high-profile events, such as IBM's development of the "Watson" computer, which successfully competed on Jeopardy!, and Google's development of AlphaGo, a program that successfully plays the complex ancient board game, Go. Data Demands Deep-Learning Bakshi focused on security and healthcare as two disciplines where deep learning can potentially have a big impact. Using deep learning with video is currently limited because so much video is unlabeled and unstructured. Still, projections are that there will be a billion cameras worldwide by 2020, providing an over-abundance of data that demands the use of deep learning to make sense of it all. "There is a misconception that AI is meant to replace us, to make humans obsolete. AI is not replacing us. It is created by humans to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently," said Bakshi. He suggested that AI is equivalent to IA; Bakshi's abbreviation meaning "intelligence augmented." Johnmichael O’Hare (left) of the Hartford Police Department, and Tanmay Bakshi (right) discusses key security issues of the modern day The ability to scale AI applications using "distributed deep learning" and graphics processing unit (GPU) hardware is paving the way for greater use of deep learning in video applications. Adam Scraba, Global Business Development Lead at NVIDIA, outlined the trends that are making the current "Big Bang" of deep learning possible. He said it is "the most exciting time in tech history," with "software that can write its own software" now among the tools that make previously unsolvable problems now solvable. AI-driven intelligent video analytics can now achieve "super-human" results, he said. An Intelligent World To Combat Crime Instead of sitting for hours staking out a suspected drug dealer alone, entire investigations now take hours instead of days A success story about the game-changing capabilities of video data was supplied by Hartford, Conn.'s Capital City Crime Center (C4). The Hartford police department uses video data in a "predictive policing" approach. They have created an "intelligent world with smart policing to combat drug trafficking," according to C4 Supervisor Johnmichael O'Hare of the Hartford Police Department. Instead of sitting for hours staking out a suspected drug dealer, for example, video of a site can be analyzed to determine areas with higher levels of foot traffic that indicate drug buys. The result is investigations that take hours instead of days. Hartford incorporates several technologies, including ShotSpotter gunshot detection, Briefcam video synopsis and other systems, all tied together using the Milestone platform. More than 700 attendees make MIPS 2018 the largest such event ever, and exhibits by around 60 Milestone partner companies attest to the continuing expansion of the Milestone community. [Main image:Tanmay Bakshi (left) and Johnmichael O’Hare of the Hartford Police Department (right) discuss key security issues of the modern day]