POWERcast: 3 Ways to Protect the IBM i from Ransomware

POWERcast: 3 Ways to Protect the IBM i from Ransomware
Speakers: Joe Hertvik & Mel Zucker
Price: Free courtesy of Software Engineering of America
Date/Time: August 19 @ 11AM (CT)

Although ransomware doesn’t attack the IBM i operating system or native DB2 libraries, it can encrypt and rename Integrated File System (IFS) stream files that support native IBM i applications and store user documents.

Ransomware attacks can disable critical IBM i processing by damaging IFS-based configuration settings and data files. Ransomware disables business processing, breaches security, and wastes money and time in recovering from an attack.

Recent ransomware events have increased the probability your IFS will be attacked, as ransomware attacks have become more prevalent. Corporations, governments, auditors and regulators are increasingly requiring stronger protection against ransomware attacks.

Join this live webinar where we’ll discuss how ransomware attacks the IBM i IFS, steps you can take to protect against ransomware and how to respond when you’re attacked. You’ll learn:

  • How ransomware attacks IFS stream files
  • Critical IBM i security settings that protect your IFS from ransomware
  • Recovery techniques and best practices to consider when an attack occurs
  • Preventing, stopping, and isolating IBM i ransomware activity in real-time

Please join us on Thursday, August 19th at 11 AM CDT to learn more about this important IBM i security issue.

Joe Hertvik has worked with IBM i and its predecessor systems since the dawn of the AS/400 in 1989. He has managed IBM i hardware and network systems for several Fortune 500 and private companies for the last 20+ years.  


Joe has written over 1000 articles covering IBM i and networking topics, making him a go-to reference for IBM i infrastructure information. He is also a former editor and columnist for IT Jungle. 

Mel Zucker is a 30-year IBM veteran, who worked in AS/400 and IBM i customer engineering, program support, system engineering, and technical consulting.

For the last 15 years, Mel has served as a lead technical support resource for SEA’s internal and external customers.

He is well versed in all aspects of IBM i system administration, operations, security, and compliance, and teaches highly technical material such as IBM i Ransomware protection in a down-to-earth manner.

8/19/2021 11:00 AM - 12:00 PM
Registration is closed.
My registration status: Not registered

Sign In