IBM i Security Virtual Tour

Intro paragraph

For the first time ever, IBM i security subject matter expert and award-winning speaker Robin Tatam has brought his five star-rated IBM i Security Tour to the web. Audiences around the world have used Robin’s unique combination of expert analysis, practical tips, and industry data to make measurable improvements in their security posture. These exclusive recordings give you the same level of insight into IBM i security—without leaving your chair.

IBM i Security Virtual Tour Sessions

Session 1: Security vs. Compliance

Session 2: The State of IBM i Security in 2018

Session 3: Maximizing IBM i Security

Session 4: Practical Tips: Auditing Events and Access to Data

Q&A from the IBM i Security Virtual Tour

Session 1

 

Session 1: Security vs. Compliance

If your organization is compliant with PCI DSS, GDPR, or even your internal security policy, does that mean you're secure? Often, the answer is no. So what's involved in being secure that compliance mandates don't cover? Robin Tatam dives into the conflict between these two concepts and provides expert tips on how to balance compliance and security.

Back to the top >

Session 2

 

Session 2: The State of IBM i Security in 2018

Cyberthreats have evolved considerably in recent years, but IBM i security hasn't kept pace at many organizations. Robin Tatam dives into the latest data on IBM i security controls, drawn from hundreds of organizations of varying sizes. Find out where IBM i security stands today and learn how you can avoid the most common vulnerabilities.

Back to the top >

Session 3

 

Session 3: Maximizing IBM i Security

Sophisticated security controls are built right into IBM i, but few organizations are taking advantage of all of them. Watch this session to learn what they are, why they're beneficial, and how you can start implementing them. Robin will even examine the newest features from the latest release of the OS.

Back to the top >

Session 4

 

Session 4: Auditing Events and Access to Data

A critical element of cybersecurity is knowing what’s happening on your system. In this session, Robin provides step-by step instructions for creating a security audit journal. You’ll find out which categories to audit, and how to avoid an avalanche of audit events. You’ll also learn how to audit the activities of specific users.

Back to the top >

QA

 

Q&A from the IBM i Security Virtual Tour

In this video, Robin fields questions from event attendees. If you have a question about the material covered during the IBM i security—or IBM i security in general—click the chat icon to send us a message. 

Back to the top >

Find the Vulnerabilities on Your Systems