Best Practices of Security with a DCM Deep Dive — Robert Andrews & Thom Haze
-
Register
- Member - Free!
Understand all the different areas of security one needs to consider — not just on IBM i — and prevent common mistakes and data loss or intrusion. >span class="NormalTextRun SCXW72245912 BCX0">. Many of the built in IBM i Security features will be covered at a high level. But something everyone should be using is TLS encryption. >span class="NormalTextRun SCXW72245912 BCX0">. Don’t miss it!
Robert Andrews
Team Lead
IBM
Robert Andrews is the Team Lead for the IBM i Security and Authentication Lab Services Power Systems Delivery Practice in Rochester, MN. He is an Executive Security Consultant and a certified Thought Leader in IBM for security. Besides security, Robert is an expert in Db2, journaling, and DDM/DRDA. In addition to his technical work at IBM, Robert has been strongly involved in Emergency Management and Communications for over a decade at all levels from local to federal. Robert has published seven books and holds degrees in mathematics, computer science, education, and management.
Thom Haze
IBM i Operating System Security Development, IBM
Thom is the lead software developer for Digital Certificate Manager (DCM) and provides cryptography related enhancements to IBM i. He has been working on IBM i and earlier named platforms since 1989 on various projects such as Integrated Windows, Linux, and VMware Servers, Integrated File Server, IBM i Installation, and most recently on the IBM i Security team. Thom is a Certified Information Systems Security Professional (CISSP) focused on providing system availability,