Morning
8:15 am - 8:45 am
Continental Breakfast and Welcome
9:00 am - 9:30 am
Intro to IBM i Security – Overview of Terminology and Capabilities on IBM i
Carol Woodbury, DXR Security
The security capabilities of IBM i are immense. This session describes the basic capabilities provided and the technology used that makes this system secure-able.
9:45 am - 10:15 am
Managing user profiles to reduce risk including excess capabilities and inactive profiles
Carol Woodbury, DXR Security
Removing excess capabilities is one step of reducing risk. This session describes the user profile attributes that cause the most risk and provides recommendations for finding and reducing the risk.
10:30 am - 11:30 am
Anatomy of a Password
Robert Andrews, IBM
Have you thought about the passwords you use on your systems? What rules or restrictions do you have in place? But more importantly, why?! Have you ever thought about what those rules actually do to your passwords? Do you think they are making you more secure or less secure? In this presentation, we will cover passwords in depth, in theory, and specific to IBM i. Can your IBM i password be hacked?
11:45 am - 12:45 pm
Considerations for implementing Single Sign-on (SSO) on IBM i
Thom Haze, IBM
This presentation will describe the Kerberos protocol and how to map a domain user ID to an IBM i user profile to safely authenticate the user to an enabled network application without passwords being sent across the network.
Afternoon
2:00 pm - 3:00 pm
Introduction to Object Level Security and Using Authority Collection to Secure Data
Thom Haze, IBM
Data can be secured in a variety of ways. This session describes the capabilities provided by IBM i including the Authority Collection feature. This feature takes the guesswork out of securing data allowing you to determine exactly who is accessing the information and what authority is required so other access can be denied.
3:15 pm - 4:15 pm
Securing the IFS
Carol Woodbury, DXR Security
Access to the Integrated File System (IFS) via file shares is the entry point for ransomware on IBM i. This session will describe the capabilities available for protecting the system from ransomware.
4:30 pm - 5:30 pm
Securing Your IBM i in a Hybrid Environment
Pete Helgren, Bible Study Fellowship
Is cloud security an oxymoron? What about my IBM i applications? How can you possibly defend against so many attack vectors? If you can't eliminate the threat, can you at least minimize the exposure? This session will focus on the top 10 exploits, all of which can be launched against the IBM i whether at home or in the cloud. We look at not only securing the system and attached devices but also how to develop defensible web applications that are hosted on your IBM i.