Live Webinar

Exploring the Depths of IBM i Security


IBM i provides many options for securing the system and/or the data. Some, like working with user profiles, object authorities, and system values are obvious. Others … not so much.  

During this session, IBM i security expert Carol Woodbury will explore some of the more obscure features of IBM i security—such as using the audit journal to determine whether sessions are encrypted, securing DDM, using an authorization list to prevent access to /QSYS.LIB, and more. 

Join us for a far-reaching discussion!

1569430800 Wednesday
September 25, 2019

12:00pm to 1569434400 1:00pm
1 hour