IBM i Security Tour
IBM i security subject matter expert and award-winning speaker Robin Tatam has brought his five star-rated IBM i Security Tour to Europe. Audiences around the world have used Robin’s unique combination of expert analysis, practical tips, and industry data to make measurable improvements in their security posture. These exclusive recordings give you the same level of insight into IBM i security—without leaving your chair.
IBM i Security Virtual Tour Sessions
Session 1: Security vs. Compliance
If your organization is compliant with PCI DSS, GDPR, or even your internal security policy, does that mean you're secure? Often, the answer is no. So what's involved in being secure that compliance mandates don't cover? Robin Tatam dives into the conflict between these two concepts and provides expert tips on how to balance compliance and security.
Session 2: The State of IBM i Security in 2018
Cyberthreats have evolved considerably in recent years, but IBM i security hasn't kept pace at many organizations. Robin Tatam dives into the latest data on IBM i security controls, drawn from hundreds of organizations of varying sizes. Find out where IBM i security stands today and learn how you can avoid the most common vulnerabilities.
Session 3: Maximizing IBM i Security
Sophisticated security controls are built right into IBM i, but few organizations are taking advantage of all of them. Watch this session to learn what they are, why they're beneficial, and how you can start implementing them. Robin will even examine the newest features from the latest release of the OS.
[BONUS] Session 4: Auditing Events and Access to Data
A critical element of cybersecurity is knowing what’s happening on your system. In this session, Robin provides step-by step instructions for creating a security audit journal. You’ll find out which categories to audit, and how to avoid an avalanche of audit events. You’ll also learn how to audit the activities of specific users.