IBM i Security Best Practices 146
IBM i Security Best Practices
Approved 13
While the IBM i is an extremely secure system, there are still a variety of attack vectors that can result from administrative mistakes that can cause a breach. In this session, we will review many of the common issues and configuration errors we have seen time and again with our IBM i customers. If you are a system administrator or security officer, this session is a must attend!
Date & Time
Tuesday September 17th, 2024 11:00am EDT
End Date & Time
Tuesday September 17th, 2024 12:00pm EDT
Venue
Calusa F
Speakers
Robert Andrews
Session Format
Standard 60 Minute Session
Learning Objectives
Understand the IBM i Security Triad:   Users, Objects, and Settings
Protect the system from attacks and risks
Audience
System Admins, Security Focals
Session Level
Intermediate
Conference NAViGATE Florida

Session Comments

No comments