Sessions - Security
From the beginning, security was designed as an integral part of the IBM i operating system. These sessions will help you take the best advantage of the platform’s inherent security features. 

2018 sessions are all new:
  • Anatomy of a Bad Password
  • Anatomy of a Security Failure
  • IBM i and our False Sense of Security

NEUGC 2018 Sessions by Track – Security



Anatomy of a Bad Password  (Steve Pitcher)
Do you know the differences between IBM i password levels? How about password rules that aren’t used or actually used too much to be effective? What about common patterns from keyboards to mobile devices that make it easy for someone to just guess your password? Steve will talk about how good and bad passwords are constructed as well as how to break them with social engineering, dictionary attacks, brute force attacks and more. Learn why most passwords stink so you can protect yourself and your users.


Anatomy of a Security Failure (Steve Pitcher)

After the dust settles after a security breach, the next logical questions are: “What happened and how can we prevent it from happening again?” We will deconstruct a number of security failures that will provide lessons that you can take home and put to use immediately.


IBM i and our False Sense of Security  (Steve Pitcher)

While IBM i is arguably the most "securable" operating system in the world, your environment may have some wide open doors that you can't ignore. This session will highlight the importance of encrypting data in transit and show you how to do it easily with minimal interruption to the business.