If your manager asked you to determine whether your IBM i had been breached, what would you do?
Perhaps your firewall failed, leaving your system open to the Internet or you have an external IP address for your IBM i. Regardless of the circumstances surrounding the exposure, do you know what information you have available to prove or disprove that a breach occurred? Or how to go about analyzing it?
Based on a real scenario, Carol Woodbury will walk you through the information available on IBM i and show you her method for analyzing it.
Find the vulnerabilities on your IBM i with a comprehensive Risk Assessment. You'll get the insight you need to start closing security gaps and improve your security posture.