Comprehensive IBM i Security Series
Comprehensive IBM i Security Series
Join several IBM i security experts in this COMMON webinar, covering the gamut of Security topics and how they relate to IBM i. In this series you will have the opportunity to hear everything from introductory sessions to a number of sessions on more advanced security topics. These sessions are a must for system administrators and security administrators responsible for managing the IBM i server running on Power.
The webinar presents two sessions a day, starting at 12:00 pm CT and 1:15 pm CT, over four consecutive Thursdays this fall.
1. Security 101 (Carol Woodbury) OCTOBER 24
Whether you're new to IBM i Security or need a refresher, this session provides the building blocks of how IBM i Security is put together. You'll learn how security-relevant system values, user profile settings and object authorities work together to provide one of the most secureable systems available today. New security system values and user profile features of V6R1 and V7R1 will be identified.
2. IBM i Auditing (Dan Riehl) OCTOBER 24
Did you know that IBM i includes powerful auditing features? Join this session to learn about activating and utilizing IBM i’s built-in forensic capabilities.
__________________________________________________
Other Webinars in the series include:
3. Encryption & Key Management (Patrick Townsend) OCTOBER 31
Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. This session discusses the principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit. Attendees will learn how key management systems work and how to evaluate vendor solutions. This is a non-technical session but will be of value to developers and implementers.
4. Automatic encryption via DB2 Field Procedures (Patrick Townsend)OCTOBER 31
Encryption without application or database changes is now possible using FIELDPROC on IBM i V7R1. Join Patrick Townsend as he discusses how organizations of all sizes are implementing FIELDPROC encryption, performance impacts, and how to make sure your FIELDPROC encryption solution will pass a compliance audit. Automatic encryption with FIELDPROC is absolutely the easiest, fastest, and most secure way to encrypt data on the IBM i.
5. Ensuring Critical Business Information is Secure with IBM i (Terry Ford) NOVEMBER 7
6. IBM i Single Signon (Pat Botz) NOVEMBER 7
7. A Primer on IBM i User Profiles and How To Properly Deploy Them (Robin Tatam) NOVEMBER 14
8. Developing Secure Applications (Robin Tatam) NOVEMBER 14
Our discussion will include why auditors are often deemed to be a programmer’s nemesis, and what it is that they really need from us.
Speaker and Presenter Information
Carol Woodbury, Dan Riehl, Patrick Townsend, Terry Ford, Patrick Botz and Robin TatamRelevant Government Agencies
Intelligence Agencies, Dept of Homeland Security, Dept of Justice
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Thu, Oct 24, 2013, 1:00pm
Cost
Individual Membership - Annually: | $156.00 |
Website
Click here to visit event website
Organizer
Common