POWERcast: 4 Best Practices for Future-Proofing IBM i MFA
-
Register
- Member - Free!
Multi-factor authentication (MFA) systems, while a valuable security measure, are not without vulnerabilities. Phishing attacks, SIM swapping, man-in-the-middle attacks, MFA fatigue, and more can still compromise logins.
Join SEA on October 30th to discover how to future-proof your IBM i MFA systems. We’ll delve into strategies and tactics to enhance IBM i login protection and defend against emerging threats. Topics include:
- Patching IBM i MFA vulnerabilities: Utilizing encryption to bolster MFA security.
- Immunizing logins against phishing: Exploring phishing-resistant MFA and password-less MFA options.
- Integrating MFA into other IBM i functions: Enhancing self-service password resets and emergency authorization solutions.
- Strengthening authentication security: Leveraging hard-to-break MFA verification factors.
Lloyd Ramdarie
IBM i Technical Support Team Member, Software Engineering of America
Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His background includes working in IBM i space for quite a number years with a large extent of his experience coming from heavy involvement with securing the IBM i. He is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end to end security solutions in the IBM i environment.
Ken McCalister
Software Engineering of America
Ken McCalister has spent 35 years working with IBM i technology . Ken has vast experience working in all aspects of digital technology and management, including Administration, Engineering & Security. Ken is part of the IBM i Technical Team at Seasoft, providing support to its many diverse clients.