Loading…
Attending this event?
Experience the magic of education. 
Tuesday, May 21 • 2:45pm - 3:45pm
Discovering your IBM i Data – For Security Administrators Issues

Log in to save this to your schedule and see who's attending!

There’s plenty information on IBM i that is so valuable for the daily tasks. Many commands, APIs, and lately SQL functions, gather information from your IBM i, into database tables. While other System functions register data on different tables all the time.
Throughout my life I spent a lot of time working on this information. Particularly related to security administration activities: analyzing user profiles, object ownership and authorities, authority lists, program adoptions, exit programs implemented, exploiting audit journal entries, analyzing Db2 activities, and the list goes on and on. All this information is as valuable to IT System Managers, as it is enterprise information to Business executives. You need to understand, evaluate, and take advantage of this knowledge.
In this session we will review the different types of system information you can find on IBM i, that are important for Security Administrators. We’ll also analyze different case studies of how to interpret and prepare the info for future exploitation.

Learning Objectives:

1. Identify different kinds of Information available in your IBM i.
2. Analyze different ways of obtaining and/or finding this information in your systems.
3. Prepare information for better use with modern tools.

Speakers
avatar for Cecilia Howlin

Cecilia Howlin

Owner, PYRAMIS S.R.L.
Cecilia Howlin has been working on this platform from the very beginning. On her first job at IBM Argentina, she learned S/38. And never left the platform, since she thinks it never appeared other operating system as good as this one. | She usually worked on technical issues, like... Read More →


Tuesday May 21, 2019 2:45pm - 3:45pm
Adventure Tower Amazon

Twitter Feed