COMMON Webinars are part of the new “COMMON…Customized” education model. Webinars are a series of live web-based seminars on leading edge topics to meet the increasing educational needs of attendees. Delivered over a 4-6 week span and conducted by industry-leading experts, COMMON Webinars provide focused education at a minimized cost. Learn and interact with the presenter right from your desk!
The fee is $149 to COMMON members, providing a competitive value and allowing you to take advantage of your membership benefits. Non-members may also participate for a fee of $249.
- Multiple hours of comprehensive web-based education on leading edge topics.
- Presented by industry experts.
- Focused, interactive education.
- Great value for COMMON members ($149) and non-members ($249) alike.
- Access to iSociety discussions with the presenter and other participants.
- Receive webinar handouts.
Comprehensive IBM i Security
by Carol Woodbury, Dan Riehl, Patrick Townsend, Terry Ford, Patrick Botz and Robin Tatam
October 24, 2013 • 12:00 pm - 2:30 pm Central Time
October 31, 2013 • 12:00 pm - 2:30 pm Central Time
November 7, 2013 • 12:00 pm - 2:30 pm Central Time
November 14, 2013 • 12:00 pm - 2:30 pm Central Time
Join several IBM i security experts in this COMMON webinar, covering the gamut of Security topics and how they relate to IBM i. In this series you will have the opportunity to hear everything from introductory sessions to a number of sessions on more advanced security topics. These sessions are a must for system administrators and security administrators responsible for managing the IBM i server running on Power.
The webinar presents two sessions a day, starting at 12:00 pm CT and 1:15 pm CT, over four consecutive Thursdays this fall.
1. Security 101 (Carol Woodbury) OCTOBER 24
Whether you're new to IBM i Security or need a refresher, this session provides the building blocks of how IBM i Security is put together. You'll learn how security-relevant system values, user profile settings and object authorities work together to provide one of the most secureable systems available today. New security system values and user profile features of V6R1 and V7R1 will be identified.
2. IBM i Auditing (Dan Riehl) OCTOBER 24
Did you know that IBM i includes powerful auditing features? Join this session to learn about activating and utilizing IBM i’s built-in forensic capabilities.
3. Encryption & Key Management (Patrick Townsend) OCTOBER 31
Your encrypted data is only as secure as your encryption keys. A strong encryption key management strategy is essential for a comprehensive security policy, as well as meeting compliance requirements. This session discusses the principles and best practices for encryption key management including key management, key storage, secure key retrieval, key escrow, key mirroring, industry standards, compliance guidelines, and system audit. Attendees will learn how key management systems work and how to evaluate vendor solutions. This is a non-technical session but will be of value to developers and implementers.
4. Automatic encryption via DB2 Field Procedures (Patrick Townsend) OCTOBER 31
Encryption without application or database changes is now possible using FIELDPROC on IBM i V7R1. Join Patrick Townsend as he discusses how organizations of all sizes are implementing FIELDPROC encryption, performance impacts, and how to make sure your FIELDPROC encryption solution will pass a compliance audit. Automatic encryption with FIELDPROC is absolutely the easiest, fastest, and most secure way to encrypt data on the IBM i.
5. Ensuring Critical Business Information is Secure with IBM i (Terry Ford) NOVEMBER 7
IBM i has a well deserved reputation for being one of the industry's most secure operating systems. But, to ensure that your client information and business data is secure, it is vital that you implement and use the security features built into the system. With information, experience and expertise gained from numerous client engagements over 20 years, our team of IBM Lab Services consultants from Rochester reveal the key areas that IBM i administrators must monitor and address to ensure they keep their critical information secure.
6. IBM i Single Signon (Pat Botz) NOVEMBER 7
This session provides an overview of SSO and some of its many definitions. The session introduces the business case and explains the industry unique, non-disruptive, and password elimination attributes of the IBM i approach to SSO. Based on Kerberos authentication and IBM's Enterprise Identity Mapping technology, SSO can make using and administering IBM i much less trouble than ever before.
7. A Primer on IBM i User Profiles and How To Properly Deploy Them (Robin Tatam) NOVEMBER 14
There are a few mechanisms that speak to the security of your IBM i server with as much impact as your User Profiles. It is imperative that profiles are configured and maintained correctly in order to have any chance at preventing data leakage. Learn about the security aspects of your user profiles, including:
- Special Authorities
- Limited Capabilities
- User Class
- Group Profiles
- User Auditing
- V6R1 enhancements
- Adopting Authority of Another User
- Common Ways That Users Circumvent Authority
8. Developing Secure Applications (Robin Tatam) NOVEMBER 14
Although your IBM i server is one of the most securable platforms available, the protection of critical data is often undermined by weak security design at the application level.
This session will cover the main considerations that a programmer should be aware of as they design their applications:
- Object ownership
- Adopted authority
- Public and private authorities
- Command line permission
- Client-server considerations
Our discussion will include why auditors are often deemed to be a programmer’s nemesis, and what it is that they really need from us.
Where Do I Start to Use Embedded SQL?
by Ted Holt
December 4, 2013 • 9:00 am - 4:00 pm Central Time
This webinar is designed for the developer who would like to embed SQL in application programs, but isn't sure where to start. The webinar begins with the syntax of embedded SQL, but quickly moves beyond syntax into practice. Ted shows how to develop robust applications with embedded SQL, and also shows when native I/O provides a better way to go. Examples use RPG, but the concepts are applicable to other high-level languages
- The attendee will learn how to embed SQL commands in RPG programs.
- The attendee will learn effective ways to use embedded SQL.
- The attendee will understand common mistakes and how to avoid them.
Programmers who know how to write programs in a high-level language, such as RPG or COBOL and wish to learn how to use SQL I/O operations instead of native I/O.