Let's Get Started with IBM i Security

Watch the webinar series for actionable advice about protecting your data

Cybersecurity is now a vital business matter, but developing IBM i security knowledge is a challenge for most IT professionals. The security experts at HelpSystems are here to help.

We’ve developed a security curriculum designed to help you understand the highest priority aspects of IBM i security. You’ll learn how various settings and controls work to minimize the risk of data theft, exposure, and even accidental deletion. If you’re involved with security and compliance at your organization and you have the IBM i OS in your data center, this series is for you. 

Fill out the form to access all six recorded webinars and watch them at your leisure.

 

Getting Started with IBM i Security:

System Values

Presented by: Carol Woodbury

The security system values enable you to set the tone of security on your IBM i, enforce password composition rules and enable auditing. In this first session, security expert Carol Woodbury describes these system values and provides guidance on best practice settings.

Event Auditing

Presented by: Robin Tatam

Learn why auditing is necessary, how to determine if IBM i auditing is currently active, and how to configure auditing with one simple command. In this second session, security expert Robin Tatam tackles these topics and more.

PC Access

Presented by: Robin Tatam

Find out how well-known services like FTP and ODBC enable users to access sensitive data without oversight or restrictions. In this third session, Robin Tatam explains what exit programs are and how you can use them to protect your organization.

User Privileges

Presented by: Robin Tatam

Get up to speed on privileged users, IBM i special authorities, and command line access. In this fourth session, Robin Tatam also shares tips on auditing user activities and utilizing role-based access controls (RBAC).

Integrated File System (IFS)

Presented by: Sandi Moore

Learn how the IFS is configured and how you can avoid the most common IFS security mistakes. In this fifth session, Sandi Moore also explains what viruses can do to the IFS and what you can do to prevent them.

Object Authority

Presented by: Carol Woodbury

Learn best practice principles for controlling access to data and programs. In this six session, Carol Woodbury explains public authority (*PUBLIC), how this unique IBM i concept works, and why default authority values constitute a security gap.

“There’s a limited pool of resources in the marketplace with real IBM i security knowledge. So, we look to HelpSystems for experience—that’s their real value. Anyone can provide a toolbox and a set of tools, but we need to know the risk of change and how to mitigate it. It’s all about expertise, and HelpSystems is simply the best at what they do.”

CIO and CISO
Seneca Gaming Corporation

Meet Your Presenters

Robin Tatam, Carol Woodbury, and Sandi Moore share valuable insights in IBM i Security.

 

Robin Tatam, Director of Security Technologies

Robin Tatam is a midrange industry veteran with over 25 years of IBM i experience. He is co-president of the QUSER group in Minneapolis, an award-wining speaker/subject matter expert in security for COMMON, and a member of their Speaker Excellence Hall of Fame. Robin is a Certified Information Security Manager and the co-author of IBM's Redbook publication on IBM i data encryption.

 

Carol Woodbury, Vice President of Global Security Services

Carol Woodbury has a long history with IBM i, including 10 years as iSeries Security Architect and Chief Engineering Manager for IBM in Rochester, MN. She is Certified in Risk and Information Systems Control, and is known worldwide as an author and speaker on security technology, specializing in IBM i issues.

 

Sandi Moore, Security Consultant

Sandi has been working with HelpSystems customers for over 15 years supporting systems monitoring and security software. With experience on IBM i, AIX, and Linux, she has been involved in product demonstrations, implementation, support, training, research, and product testing. Sandi has helped customers understand how to effectively address the threats they face. Her goal is to help people achieve the best solution to their IT problems, no matter how many servers are in their environment or where in the world they’re located.