IBM i Security Assessment: Replacing Risky Practices
When it comes to cybersecurity, the best way to keep important data and records safe is by analyzing threats and making adjustments to security settings and processes to mitigate those risks. Knowing what to look for when it comes to assessing security settings and processes that might be putting your IBM i at risk is an important first step in this process.
Join us for this webinar on April 28, 2020 at 1pm ET as we discuss the key areas that need to be evaluated when assessing risky practices, including sign-on attributes, network protection, auditing system and user activities as well as analyzing user privileges and how you can mitigate risks associated with these areas.
In our upcoming webinar, we’ll review:
• Common practices that make put your system in jeopardy
• Key Areas that need to be evaluated when assessing security
• Tools that can be used to mitigate these risks
• Best practices in order to keep your system safer, going forward
Mel Zucker has been a Senior IBM i Solutions Engineer with Software Engineering of America for the past 9 years. Prior to joining SEA, Mel was a member of the IBM team supporting their line of midrange products for over 30 years. While at IBM, Mel was the recipient of multiple IBM Means Service and System Engineering Achievement awards.