IBM i Security Best Practices 238
IBM i Security Best Practices
Approved 2
While the IBM i is an extremely secure system, there are still a variety of attack vectors that can result from administrative mistakes that can cause a breach. In this session, we will review many of the common issues and configuration errors we have seen time and again with our IBM i customers. If you are a system administrator or security officer, this session is a must attend!
Date & Time
Wednesday November 6th, 2024 8:30am EST
End Date & Time
Wednesday November 6th, 2024 9:30am EST
Venue
Pier 2
Session Format
Standard 60 Minute Session
Learning Objectives
Understand the IBM i Security Triad:  Users, Objects, and Settings
Protect the system from attacks and risks
Audience
System Admins, Security Focals
Session Level
Intermediate
Conference NAViGATE Toronto

Session Comments

No comments