The Most Common IBM i Security Exposures and How to Assess Your System
Many in the IBM i community have the belief that IBM i is a secure system right out of the box. While IBM i is a highly securable system, it also presents unique challenges to security officers and system administrators
Achieving a secure and compliant IBM i environment is often a complex and difficult process. External threats and the array of updated security regulations continue to increase the demand on our limited security resources.
This presentation addresses numerous common security related exposures that contribute to the vulnerability of our great IBM i system. A main focus will be on “How to” identify these exposures and “How to” perform the required remediation to eliminate the exposures.
Dan Riehl is the president and security specialist for IT Security and Compliance Group where he performs IBM i security assessments and provides customized security services for his customers. He also provides training in all aspects of IBM i security and other technical topics through his training company, The 400 School, which he founded in 1996. Dan is also familiar to most IBM i professionals through his many books and magazine articles on Security and Systems Management written for System iNEWS, News/400, News 34/38, News 3X/400, iSeries NEWS, over the past 30 years.
PO Box 168273,