Experts’ fears surrounding the risks associated with poor configuration were recently confirmed by the 2018 State of IBM i Security Study. Published annually, the results reveal most Power Systems lack adequate security controls and auditing measures.
In this fast-paced webinar series, leading experts Robin Tatam, Carol Woodbury, and Sandi Moore share insight into critical areas of IBM i security.
Carol Woodbury, author of IBM i Security: Administration and Compliance, opens the series with an introduction to security-relevant system values.
System values are one of the fundamental elements of IBM i security. The security system values enable you to “set the tone” of security on your IBM i, enforce password composition rules, and enable auditing. In this live event, watch as she describes these system values and provides guidance on their best practice settings.