Log in
Remember me
Forgot password
Home
About Us
Board of Directors
Join now
Membership benefits
Online Application
Events
Speaker Information
Other User Groups
Contact Us
Back
Now TWO Sessions on IBMi Security; The Good, the Bad and the Ugly and Deploying User Profiles Properly by Robin Tatam
When
19 Feb 2015
5:30 PM
Location
111 Route 46 East, Parsippany, NJ 07054
Registration
Member Early-Bird – $55.00
Member Regular – $60.00
Member Walk-ins – $65.00
Non-Member Early-Bird – $70.00
Non-Member Regular – $75.00
Non-Member Walk-Ins – $80.00
Registration is closed
Start Time: Reg. 5:30 pm
IBM i Security:
The Good, the Bad, and the Ugly
by Robin Tatam
Bonus Session just added!
"How to Deploy IBM i User Profiles Properly"
Encore Performance in a
continuation of the
Security Series by Powertech
Don’t miss more than a decade’s worth of research on the security configurations of IBM-i based servers and the successes and failures of organizations that run critical applications on them.
PowerTech has audited thousands of IBM i servers around the world, gaining extensive, real-world insight into the deployment state of IBM i security controls.
Join me for a recap of eye-opening statistics from this wildly popular study: The State of IBM i Security. Along with the results, this session provides a review of six configuration categories:
Network-initiated commands & data access
Server-level security controls
Profile and password settings
Administrative capabilities
Public accessibility to corporate data
System event auditing
Learn what steps your own organization must take to address these continually overlooked and dangerous security exposures—including some that are often missed by professional auditors!
Bonus Session
How To Deploy IBM i User Profiles Properly
There are a few mechanisms that speak to the security of your IBM i server with as much impact as your User Profiles. It is imperative that profiles are configured and maintained correctly in order to have any chance at preventing data leakage. Attend this important session to learn about the security aspects of your user profiles, including:
Special Authorities
Limited Capabilities
User Class
Group Profiles
User Auditing
V6R1 enhancements
Adopting Authority of Another User
Common Ways That Users Circumvent Authority
<<- Click
Powered by an easy and affordable
Event Management Host
Powered by
Wild Apricot
. Try our all-in-one platform for easy membership management
Try it FREE