![](/accounts/common/images/logo.png)
- Registration Closed
Learning Objectives - By the end of this video, participants should be able to:
1. Describe best security practices for Db2 for i
2. Identify tools to increase security for Db2 for i: Guardium Database Activity Monitor; Journal Extraction Tool
3. Employ IBM i Services to manage object authorities
4. Reduce access to sensitive data using RCAC
![Speaker image](https://70ecbb36cf5afa131dcc-6f15f2badde623b67dc4ad2e21c9f77b.ssl.cf2.rackcdn.com/common_e041c2202a74040971143aee35a0ec9c.jpg)
Scott Forstie
Db2 for i Business Architect
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.
Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.
Key:
![](/images/product-status-icons/complete-small.png)
![](/images/product-status-icons/next-small.png)
![](/images/product-status-icons/disabled-small.png)
![](/images/product-status-icons/optional-small.png)
![](/images/product-status-icons/locked-small.png)