
- Registration Closed
Learning Objectives - By the end of this video, participants should be able to:
1. Describe best security practices for Db2 for i
2. Identify tools to increase security for Db2 for i: Guardium Database Activity Monitor; Journal Extraction Tool
3. Employ IBM i Services to manage object authorities
4. Reduce access to sensitive data using RCAC

Scott Forstie
Db2 for i Business Architect
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.
Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.
Key:




