Sessions - Security
From the beginning, security was designed as an integral part of the IBM i operating system. These sessions will help you take the best advantage of the platform’s inherent security features.

2017 sessions will include:
  • IFS Security: Don't Leave Your Server Vulnerable
  • Data Breaches: Is IBM i Really at Risk?
  • Configuring and Using IBM i Auditing Features
  • 7 Habits of Highly Secure Organizations

NEUGC 2017 Sessions by Track – Security

IFS Security: Don't Leave Your Server Vulnerable (Robin Tatam)

Experts agree that one of the most overlooked areas of IBM i security is the integrated file system (IFS). Despite containing many sensitive things, including the operating system and all of your application libraries and files, IFS security remains a mystery to most administrators.

Attend this important session to learn about securing the IFS, including what users may be doing with little more than a user profile and password:

  • Why do we care about the IFS?
  • Permissions versus authority
  • Root folder access
  • Auditing IFS activities
  • Read/write versus *ALLOBJ
  • Anti-virus considerations

Data Breaches: Is IBM i Really at Risk? (Robin Tatam)

Despite an avalanche of regulatory mandates and industry awareness, news headlines remain chock full of stories about data breaches. Although Power Servers often live inside the safety of the perimeter firewall, the risk of suffering a data leak or data corruption remains high.
Would you know if a data breach happened? How would a breach affect your business?

Join noted IBM i security expert and certified auditor, Robin Tatam, as he discusses common ways that this supposedly “secure” operating system may actually be vulnerable and who the culprits might be.

Configuring and Using IBM i Auditing Features (Robin Tatam)

Did you know that IBM i includes powerful auditing features? Join this session to
learn about activating and utilizing IBM i’s built-in forensic capabilities.

You will learn about:

  • Security audit journal
  • Audit data management
  • Configuring the ‘Audit’ system values
  • A user profile’s *AUDIT special authority
  • Object auditing
  • User auditing
  • Data reporting options

You will also learn about what system auditing does *not* capture, and how to
prevent that from causing you to fail an audit.

7 Habits of Highly Secure Organizations (Robin Tatam) 

We all desire “best-practice” security, but what are the best organizations doing?

Attend this session to learn details about how to accomplish the 7 habits that are part of daily life for secure organizations, including:

  • Break the Ostrich Syndrome?
  • Develop A Security Policy
  • Assess Current Standing
  • Perform Event Logging and Notification
  • Utilize Best of Breed Technologies
  • Monitor for Ongoing Compliance
  • Plan For The Future

We will dig into what each of these habits means to IBM i, and you can make sure that you don’t become the next statistic.