Board of Directors
Other User Groups
Now TWO Sessions on IBMi Security; The Good, the Bad and the Ugly and Deploying User Profiles Properly by Robin Tatam
19 Feb 2015
111 Route 46 East, Parsippany, NJ 07054
Member Early-Bird – $55.00
Member Regular – $60.00
Member Walk-ins – $65.00
Non-Member Early-Bird – $70.00
Non-Member Regular – $75.00
Non-Member Walk-Ins – $80.00
Registration is closed
Start Time: Reg. 5:30 pm
IBM i Security:
The Good, the Bad, and the Ugly
by Robin Tatam
Bonus Session just added!
"How to Deploy IBM i User Profiles Properly"
Encore Performance in a
continuation of the
Security Series by Powertech
Don’t miss more than a decade’s worth of research on the security configurations of IBM-i based servers and the successes and failures of organizations that run critical applications on them.
PowerTech has audited thousands of IBM i servers around the world, gaining extensive, real-world insight into the deployment state of IBM i security controls.
Join me for a recap of eye-opening statistics from this wildly popular study: The State of IBM i Security. Along with the results, this session provides a review of six configuration categories:
Network-initiated commands & data access
Server-level security controls
Profile and password settings
Public accessibility to corporate data
System event auditing
Learn what steps your own organization must take to address these continually overlooked and dangerous security exposures—including some that are often missed by professional auditors!
How To Deploy IBM i User Profiles Properly
There are a few mechanisms that speak to the security of your IBM i server with as much impact as your User Profiles. It is imperative that profiles are configured and maintained correctly in order to have any chance at preventing data leakage. Attend this important session to learn about the security aspects of your user profiles, including:
Adopting Authority of Another User
Common Ways That Users Circumvent Authority
Powered by an easy and affordable
Event Management Host