[ ALL_RESOURCES ] [ DATABASE ] [ GENERAL ] [ MODERNIZATION ] [ NEWS & UPDATES ] [ PROGRAMMING ] [ SECURITY ] [ SYSTEMS & ADMIN ]
TYPE_VIDEO FILE_REF: 0x683

Fundamentals for Cyber Security on the IBM i (AS400/iSeries) | Proximity Webinar

> ANALYSIS_OF: FUNDAMENTALS_FOR_CYBER_SECURITY_ON_THE_IBM_I_(AS400/ISERIES)_|_PROXIMITY_WEBINAR_

This webinar covers the fundamentals of cyber security specifically tailored for IBM i (AS/400/iSeries) systems.
  • Understanding Threats: The session begins with an overview of common cyber threats that target IBM i environments, including malware, phishing, and insider threats.
  • Security Best Practices: It emphasizes best practices for securing IBM i systems, such as implementing strong password policies, user access controls, and regular system audits.
  • System Configuration: The video discusses the importance of proper system configuration, including the use of security features like object-level security and authority management.
  • Monitoring and Logging: Participants will learn about the significance of monitoring system logs and using tools to detect unauthorized access or anomalies.
  • Backup and Recovery: The webinar covers strategies for data backup and recovery to ensure business continuity in the event of a cyber incident.
  • Compliance and Regulations: It also addresses compliance with industry regulations and standards that impact IBM i security, such as PCI-DSS and GDPR.
  • Incident Response: Finally, the session outlines steps for developing an incident response plan to effectively address security breaches.
This comprehensive approach equips RPG/CL programmers with the knowledge to enhance the security posture of their IBM i applications and systems.