Loading…
Friday, September 18 • 1:00pm - 4:00pm
HALF DAY WORKSHOP: Preparing for and Investigating the Unthinkable... Your IBM i has been attacked

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!



This half day workshop is broken into two parts, both delivered live via Zoom.  

Part 1: Preparing for an Attack on an IBM i Partition
Whether a user clicked on that wrong link and your IBM i has been infected with ransomware, or you've been informed by officials that information from your organization has appeared on the Dark Web or a mistake in a router configuration left your IBM i directly available on the Internet, action is required. But do you know what those actions should be? These events require plans that you hope you never have to implement It’s like knowing where the fire escapes are – you want to know where the escape route is PRIOR to a fire breaking out. This session describes the plans to make and steps to take to ensure you’re prepared should your IBM i be attacked.

Part 2: Investigating an Attack on IBM i and the Top 5 Steps to Take to Prevent Future Attacks
Perhaps your organization has been attacked but it's not clear whether your IBM i has been affected. Or perhaps your system accidentally became accessible on the Internet and you need to determine whether the system was accessed. Based on a real-life incident, Carol will describe the steps to take (e.g., the audit journal entries to examine and logs to read) to determine whether your IBM i has been breached. She will also describe the top 5 steps you can take on IBM i to prepare for and to prevent future attacks.

Speakers
avatar for Carol Woodbury

Carol Woodbury

President and CTO, DXR Security


Friday September 18, 2020 1:00pm - 4:00pm CDT
Database Room