IBM i Security: The Good, the Bad, and the Downright Ugly - Robin Tatam

  Don’t miss out on more than a decade’s worth of market research on the security configurations of IBM i servers and the successes and failures of organizations that run critical applications on them. HelpSystems has audited thousands of IBM i servers around the world, gaining extensive, real-world insight into the deployment state of IBM i security controls. Learning Objectives: Join the author of the wildly popular "State of IBM i Security" study for a recap of eye-opening statistics from the current report. Along with the results, this session provides review and tips in seven configuration categories: • Network-initiated commands & data access • Server-level security controls • Profile and password settings • Administrative capabilities • Public accessibility to corporate data • System event auditing • Virus scanning Learn what steps your own organization must take to address these continually overlooked and dangerous security exposures—including some that are often missed by professional auditors!

Robin Tatam

Global Director of Security Technologies - HelpSystems

HelpSystems

Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive Power Server experience has resulted in more than 20 IBM certifications and the highly sought after designation of ISACA-certified Information Security Manager (CISM) and PCI-Professional (PCI-P). He is also co-author of IBM’s Redbook publication on IBM i Data Encryption.

Key:

Complete
Failed
Available
Locked
Video
Open to view video.
Open to view video.