IBM i Security Best Practices - Jeff Uehling

Security best practice and regulatory compliance are a constantly moving target. In this webinar, Jeff Uehling, Syncsort’s Product Management Director for security solutions and former architect for the security functions in the IBM i OS, shares what he has learned about best practices in his over 30 years of experience with IBM i security. You’ll learn: • Why you need to run at security level 50 – and the exposures of running at lower levels • How to detect and prevent programs that could compromise system security • Necessary system value settings • How to apply cryptography to protect your data • Network security requirements • Security considerations for mobile deployments • How Syncsort’s security solutions help you achieve best practice Whether you are a systems security officer or an IBM i system administrator, you don’t want to miss this webinar.

Jeff Uehling

Syncsort Security Expert

Jeff Uehling has over 30 years of experience working in security technology for the IBM i, and its predecessor systems, and is an expert in the Syncsort’s security offerings. Jeff’s IBM experience includes working in the IBM i OS development group, specifically as lead architect of the security development team, where his responsibilities included architecture, design and development of IBM i security. He has also served as a council member of the IBM security technical community.

Key:

Complete
Failed
Available
Locked
Video
Open to view video.
Open to view video.