Comprehensive IBM i Security Series



Comprehensive IBM i Security Series

Join several IBM i security experts in this COMMON webinar, covering the gamut of Security topics and how they relate to IBM i. In this series you will have the opportunity to hear everything from introductory sessions to a number of sessions on more advanced security topics. These sessions are a must for system administrators and security administrators responsible for managing the IBM i server running on Power.

The webinar presents two sessions a day, starting at 12:00 pm CT and 1:15 pm CT, over four consecutive Thursdays this fall.

1. Security 101 (Carol Woodbury) OCTOBER 24

Whether you're new to IBM i Security or need a refresher, this session provides the building blocks of how IBM i Security is put together. You'll learn how security-relevant system values, user profile settings and object authorities work together to provide one of the most secureable systems available today. New security system values and user profile features of V6R1 and V7R1 will be identified.

2. IBM i Auditing (Dan Riehl) OCTOBER 24

Did you know that IBM i includes powerful auditing features? Join this session to learn about activating and utilizing IBM i’s built-in forensic capabilities.

__________________________________________________

Other Webinars in the series include:

3. Encryption & Key Management (Patrick Townsend) OCTOBER 31

Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. This session discusses the principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit. Attendees will learn how key management systems work and how to evaluate vendor solutions. This is a non-technical session but will be of value to developers and implementers.

4. Automatic encryption via DB2 Field Procedures (Patrick Townsend)OCTOBER 31

Encryption without application or database changes is now possible using FIELDPROC on IBM i V7R1. Join Patrick Townsend as he discusses how organizations of all sizes are implementing FIELDPROC encryption, performance impacts, and how to make sure your FIELDPROC encryption solution will pass a compliance audit. Automatic encryption with FIELDPROC is absolutely the easiest, fastest, and most secure way to encrypt data on the IBM i.

5. Ensuring Critical Business Information is Secure with IBM i (Terry Ford) NOVEMBER 7

6. IBM i Single Signon (Pat Botz) NOVEMBER 7

7. A Primer on IBM i User Profiles and How To Properly Deploy Them (Robin Tatam) NOVEMBER 14

8. Developing Secure Applications (Robin Tatam) NOVEMBER 14

Our discussion will include why auditors are often deemed to be a programmer’s nemesis, and what it is that they really need from us.

Speaker and Presenter Information

Carol Woodbury, Dan Riehl, Patrick Townsend, Terry Ford, Patrick Botz and Robin Tatam

Relevant Government Agencies

Intelligence Agencies, Dept of Homeland Security, Dept of Justice


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Thu, Oct 24, 2013, 1:00pm


Cost

Individual Membership - Annually:  $156.00


Website
Click here to visit event website


Organizer
Common



Return to search results