Controlling Insider Threats on IBM i

Live Webinar

Controlling Insider Threats on IBM i


Let’s face facts: servers don’t hack other servers. Despite the avalanche of regulations, news headlines remain chock full of stories about data breaches, all initiated by insiders or intruders masquerading as insiders.

User profiles are often duplicated or restored and are rarely reviewed for the appropriateness of their current configuration. This increases the risk of the profile being able to access data without the intended authority or having privileges that should be reserved for administrators.

Join noted security expert Robin Tatam as he discusses a new approach for onboarding new users on IBM i and best-practice techniques for managing and monitoring activities after they sign on.

1525194000 Tuesday
May 1, 2018

12:00pm to 1525197600 1:00pm
1 hour