Sidebar

Carol is pleased to be joined by long-time friend Tim Rowe – Business Architect for Systems Management and Application Development - from IBM in Rochester, MN. Tim and Carol will be discussing the security ‘pros and cons’ of the newer strategic clients that are available for accessing IBM i – including mobile, IBM i Access Client Solutions and i Access for the Web as well as a discussion on recently discovered vulnerabilities and exploits that may – or may not - affect these clients.

Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.

Due to popular demand, Carol has updated her presentation on configuring iAccess to use SSL sessions to include, not just the step-by-step configuration guidance but also a discussion on the benefits and challenges of using certificates from a well-known CA (Certificate Authority) vs a self-signed certificate as well as practical tips for enterprise implementation.

Based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform.  From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.

Based on her just-released e-book on Security Administration, Carol Woodbury, the authority in IBM i Security, discusses the tasks every IBM i Security Administrator should perform.  From system values to managing user profiles, administering authorities and handling IFS security issues, Carol provides guidance for automating tasks as well as tips for simplifying them.

In this Webinar security expert Carol Woodbury will discuss that several laws and regulations, including the PCI Data Security Standards require that administrators access the system over an encrypted session. Whether you have to comply with one of these regulations or you want to implement this because it's a good security practice, this session will provide the step-by-step instructions for configuring these encrypted sessions. During this webinar, you'll find out how to configure the IBM i using DCM (Digital Certificate Manager) and the steps to configure the clients.

In this Webinar security expert Carol Woodbury will discuss that several laws and regulations, including the PCI Data Security Standards require that administrators access the system over an encrypted session. Whether you have to comply with one of these regulations or you want to implement this because it's a good security practice, this session will provide the step-by-step instructions for configuring these encrypted sessions. During this webinar, you'll find out how to configure the IBM i using DCM (Digital Certificate Manager) and the steps to configure the clients.

Carol Woodbury, President of SkyView Partners, discusses the security administration requirement to view audit journal entries on a daily basis and how that can realistically be accomplished using SkyView's Audit Journal Reporter product.

Carol Woodbury, President of SkyView Partners, discusses the security administration requirement to view audit journal entries on a daily basis and how that can realistically be accomplished using SkyView's Audit Journal Reporter product.

Carol Woodbury profiles a quick tour of the benefits of SkyView's Managed Security Services. • SkyView Managed Security Services is a monthly offering where SkyView Security Experts (led by Carol Woodbury) will pay attention to your IBMi or Open Systems security, so you don't have to. SkyView delivers monthly reports summarizing issues that may require action.

Carol Woodbury profiles a quick tour of the benefits of SkyView's Managed Security Services. • SkyView Managed Security Services is a monthly offering where SkyView Security Experts (led by Carol Woodbury) will pay attention to your IBMi or Open Systems security, so you don't have to. SkyView delivers monthly reports summarizing issues that may require action.

Security expert Carol Woodbury, President of SkyView Partners, and application lifecycle management expert Marty Acks, Product Manager for MKS Inc., discuss determining your organization's data security requirements and understanding how these requirements filter throughout your organization's IT processes. In this session, you will learn:

  • The reason data classification is key to meeting your organization's security requirements
  • Tips for determining and implementing data classification throughout your IT processes
  • Key controls for preventing the corruption of production data
  • The role of Application Lifecycle Management (ALM) in securing your organization's data

Click for more of Carol's videos.

We can learn a lot about passing PCI audits by looking at what others have done. This Webinar shares the top reasons companies fail audits and explains what actions can be taken to make sure your company doesn't fall victim to the same issues. Leading security experts Gary Palgon, VP Product Management for nuBridges, and Carol Woodbury, President of SkyView Partners, discuss the challenges of PCI DSS compliance and provide recommendations on how to successfully pass a PCI audit. In this session, you will learn:

  • The top reasons companies fail PCI audits
  • The importance of encryption, key management, and logging
  • Ways tokenization helps to reduce the scope of PCI audits
  • What part a security policy plays in compliance
  • Common mistakes in configuring systems to meet PCI requirements
  • Policy establishment and ongoing compliance management

Click for more of Carol's videos.

Page 1 of 2

LATEST COMMENTS