Inject More Security into Db2 for i

In this new session, Scott will explore the many ways that “bad actors” can attempt to subvert the security on IBM i. Whether the topic is protecting against SQL Injection, closing doors to acquiring elevated privileges, or attempting to discover unprotected objects, this session will include techniques for evaluation and protection of your IBM i. Attend this session to take a big step towards discovering and eliminating attack vectors within Db2 for i!

Scott Forstie

Db2 for i Business Architect

Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.

Scott is a frequently published author, speaker at industry events around the globe and can be found @Forstie_IBMi and forstie@us.ibm.com. Scott is an avid runner and enjoys cooking.

Key:

Complete
Failed
Available
Locked
Video
Open to view video.
Open to view video.