Carol is pleased to be joined by long-time friend Tim Rowe – Business Architect for Systems Management and Application Development - from IBM in Rochester, MN. Tim and Carol will be discussing the security ‘pros and cons’ of the newer strategic clients that are available for accessing IBM i – including mobile, IBM i Access Client Solutions and i Access for the Web as well as a discussion on recently discovered vulnerabilities and exploits that may – or may not - affect these clients.
MC Security
Introduction to Configuring iAccess Servers to use SSL
Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.
Introduction to Configuring iAccess Servers to use SSL
Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.
Best Practices for IBM i Security Administration
Based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform. From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.
Best Practices for IBM i Security Administration
Based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform. From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.
Configuring IBM i iSeries Access Server to Use SSL
In this Webinar security expert Carol Woodbury will discuss that several laws and regulations, including the PCI Data Security Standards require that administrators access the system over an encrypted session. Whether you have to comply with one of these regulations or you want to implement this because it's a good security practice, this session will provide the step-by-step instructions for configuring these encrypted sessions. During this webinar, you'll find out how to configure the IBM i using DCM (Digital Certificate Manager) and the steps to configure the clients.
Configuring IBM i iSeries Access Server to Use SSL
In this Webinar security expert Carol Woodbury will discuss that several laws and regulations, including the PCI Data Security Standards require that administrators access the system over an encrypted session. Whether you have to comply with one of these regulations or you want to implement this because it's a good security practice, this session will provide the step-by-step instructions for configuring these encrypted sessions. During this webinar, you'll find out how to configure the IBM i using DCM (Digital Certificate Manager) and the steps to configure the clients.
Security Admin Tasks - Examining the Audit Journal
Carol Woodbury, President of SkyView Partners, discusses the security administration requirement to view audit journal entries on a daily basis and how that can realistically be accomplished using SkyView's Audit Journal Reporter product.
Security Admin Tasks - Examining the Audit Journal
Carol Woodbury, President of SkyView Partners, discusses the security administration requirement to view audit journal entries on a daily basis and how that can realistically be accomplished using SkyView's Audit Journal Reporter product.
IBM i Security Review - You don't know what you don't know!
Carol Woodbury, President of SkyView Partners, describes why you might want or need to have a security review of your IBM i systems done and why it's important to have an expert perform that review
IBM i Security Review - You don't know what you don't know!
Carol Woodbury, President of SkyView Partners, describes why you might want or need to have a security review of your IBM i systems done and why it's important to have an expert perform that review
Tour of SkyView Managed Security Services
Carol Woodbury profiles a quick tour of the benefits of SkyView's Managed Security Services. • SkyView Managed Security Services is a monthly offering where SkyView Security Experts (led by Carol Woodbury) will pay attention to your IBMi or Open Systems security, so you don't have to. SkyView delivers monthly reports summarizing issues that may require action.
Tour of SkyView Managed Security Services
Carol Woodbury profiles a quick tour of the benefits of SkyView's Managed Security Services. • SkyView Managed Security Services is a monthly offering where SkyView Security Experts (led by Carol Woodbury) will pay attention to your IBMi or Open Systems security, so you don't have to. SkyView delivers monthly reports summarizing issues that may require action.
Managing the Security of Your Data to Meet Your Business Needs
Security expert Carol Woodbury, President of SkyView Partners, and application lifecycle management expert Marty Acks, Product Manager for MKS Inc., discuss determining your organization's data security requirements and understanding how these requirements filter throughout your organization's IT processes. In this session, you will learn:
- The reason data classification is key to meeting your organization's security requirements
- Tips for determining and implementing data classification throughout your IT processes
- Key controls for preventing the corruption of production data
- The role of Application Lifecycle Management (ALM) in securing your organization's data
Why Companies Fail PCI Audits
We can learn a lot about passing PCI audits by looking at what others have done. This Webinar shares the top reasons companies fail audits and explains what actions can be taken to make sure your company doesn't fall victim to the same issues. Leading security experts Gary Palgon, VP Product Management for nuBridges, and Carol Woodbury, President of SkyView Partners, discuss the challenges of PCI DSS compliance and provide recommendations on how to successfully pass a PCI audit. In this session, you will learn:
- The top reasons companies fail PCI audits
- The importance of encryption, key management, and logging
- Ways tokenization helps to reduce the scope of PCI audits
- What part a security policy plays in compliance
- Common mistakes in configuring systems to meet PCI requirements
- Policy establishment and ongoing compliance management