SlideShare a Scribd company logo
1 of 72
25 August 2015
Expert Uncovers the
“Dirty Little Secret” of IBM i Security
!! Security Alert !!
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners2
ROBIN TATAM
Director of Security Technologies
robin.tatam@powertech.com
Your Presenter
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners3
• Has over 25 years of IBM i experience, including
10 years in security
• Is a subject matter expert and award-winning
speaker for COMMON
• Officially certified by ISACA as an Information
Security Manager
• Holds more than 20 IBM certifications
• Hosts technical presentations on a variety of
security topics
• Authors articles on security for leading trade
journals and newsletters
• An award-winning photographer
Your Presenter
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners4
Security vs. Compliance
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners5
Security
A state of being whose ultimate
objective is to prevent unauthorized
or undesired activity
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners6
Compliance
The adherence to a stated
policy or standard
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners7
Warning: You can be fully compliant
even if the policy or standard does
not outline desirable practices!
Security vs. Compliance
Policy:
• Don’t prevent authorized activity
• Allow any user to modify data
• Permit data to be taken home
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners8
The primary goal of a compliance
standard is to act as a guideline to help
maintain an acceptable level of
operating procedures and security.
Regulations are:
– Not a precise technical roadmap
– Have to be interpreted
– Often outline a basic minimum
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners9
Businesses rely on auditors to be interpreters.
Unfortunately, many don’t speak the ‘i’ language.
4.3.2 Privileged
account access should…
Don’t grant
end users *ALLOBJ
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners10
Okay SOX, what
should I set my
system values to?!
Regulations don’t usually speak
‘technology’, and certainly don’t speak ‘i’.
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners11
Far too many organizations approach
compliance as the sole objective without
seeing the value to their security.
Security vs. Compliance
What’s the least I can do
and still be able to check
the box to say I did it?
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners12
Unfortunately, the fact that
most organizations have to
invest so much to achieve
compliance shows how our
security has fallen short.
Don’t lose sight of security even
when your compliance is your
primary objective.
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners13
Do you have your own
regulatory directive?
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners14
Maybe you say NO!
as you don’t have to deal with
PCI, HIPAA, SOX, GLBA, BASEL II, etc.
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners15
But
everyone
should have one
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners16
It’s called a
Security Policy
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners17
A security policy is a map to guide employees
and may contain many levels targeted at
different audiences, business units, or purposes.
Corporate What the business goal is
Information Technology
How to configure the technology to support the
business goals
End User Acceptable use policies
Security vs. Compliance
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners18
How susceptible is my
IBM Power Systems
server to attack?
“I was assured this
server was secure!”
Why Do We Care? We’re On Power Systems!
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners19
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners20
The IBM i
operating
system is
secure
Why Do We Care? We’re On Power Systems!
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners21
Why Do We Care? We’re On Power Systems!
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners22
Why Do We Care? We’re On Power Systems!
What do you think?
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners23
The IBM i
operating
system is
secure
Why Do We Care? We’re On Power Systems!
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners24
The IBM i
operating system
is highly
securable
Why Do We Care? We’re On Power Systems!
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners25
Secure Securable
A Common Misconception
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners26
They’re On To Us!
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners27
“Security by obscurity”
is no longer a good option…
Of course, it never
really was!
v
Hacking for Dummies?
Security By Obscurity
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners28
But are you using them?
IBM i contains numerous
world-class security features!
A Common Misconception
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners29
What’s integrated?
– Intrusion Detection System (IDS)
– Support for Role-Based Access (RBAC)
– Object-level security
– Event auditing
– Operating system integrity protection
– Security exit points
What Comes Free (or Cheap)?
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners30
What else is needed?
– Security exit programs
– User provisioning and management
– Real-time audit notification
– Database monitoring
– Audit and compliance reporting and control
– Anti-virus software
What Upgrades Are Available?
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners31
An Alarming State
State of IBM i Security
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners32
PowerTech uses anonymous audit data
from our Compliance Assessment tool
to compile an annual study of security
statistics.
This study (available online) provides a
picture of what IBM i shops are
currently doing with their security
controls.
And, year after year, it shows that there
is definitely still room (and a need) for
improvement!
Where Is Improvement Needed?
2015
www.helpsystems.com/powertech
resources / white-papers
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners33
QSECURITY: System Security Level
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners34
Library Authority
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners35
Password Frenzy
Not too hard to
guess your way in!
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners36
Who’s Using the Audit Journal?
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners37
Managing
Network Access
Network Access
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners38
Exit Point Coverage
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners39
Exit Point Coverage
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners40
PowerTech Network Security
• Modern Browser-based UI
• Multi-Partition Aware
• Real-time Dashboards
• Transaction Reports
• Access Control
• Alert Notification
• On-going development
• World-class Support
Comprehensive Exit Point Coverage
from the leader in IBM i Security
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners41
Managing
Privileged Users
Privileged Users
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners42
Programmers
Claim they need *ALLOBJ authority to fix production applications
System Administrators
Claim they need *IOSYSCFG authority to configure and change the
system and *SECADM and perhaps *ALLOBJ to reset passwords
Operators
Claim they need *JOBCTL, *SPLCTL, and *SAVSYS to IPL and do
backups and other specialized functions
Vendors
Can’t imagine running without Security Officer rights
Privileged Users
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners43
END USER # 427
Oh, and…
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners44
Limit Capabilities *NO
User Class *PGMR
Initial Menu QSYS/MAIN
Special Authorities: *ALLOBJ, *JOBCTL
Operations Navigator
END USER # 427
Hackers Aren’t The Only Threat
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners45
Endless Examples of Insider Breaches
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners46
Don’t ever assume that
“my users could not/would not (know how to) do that”
because you already gave them a valid login.
It CAN Happen To You
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners47
The #1 issue cited
by auditors is:
Control and monitoring
of powerful users
Auditors Are In Agreement
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners48
What defines a powerful user?
1. Carry one or more special
authorities
2. Granted private authority
3. Access to a system with
permissive public access
to production data
PLUS the ability to execute commands
What is Powerful?
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners49
How Many On Each Server (Average)?
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners50
5
Mistakes Are Made
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners51
Grant access to privileges on an as-needed
basis.
User Actions should be audited to ensure
accountability and visibility to each individual’s
activities.
This is required to satisfy virtually all regulatory
mandates worldwide.
Mitigate This!
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners52
PowerTech Authority Broker
User profile
lacks
necessary
authority
Switch profile
request
submitted
Authority
increased
Comprehensive Reporting
Profile Swap Alerts
Separation of Duties
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners53
PowerTech Authority Broker
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners54
PowerTech Authority Broker
Easy-to-read (and searchable) visibility to:
• Interactive SQL
• Data File Utility (DFU)
• System Service Tools (SST)
• Program Development Manager
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners55
A Common Myth
A Common Myth
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners56
‘i’ can contract a virus!
Long thought to be immune to the virus threat, IBM i can
actually act as the source of virus problems on your network.
Virus activity can be discovered on:
• Mapped Drives
• FTP
• Image Catalogs
• Backup Tapes
• High Availability
A Common Myth
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners57
Who’s Scanning For Viruses?
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners58
Where Next?
Wrapping Up
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners59
• Data is secured by out-of-date methods
(if at all).
• Management assumes data is secured
as no one is advising them otherwise.
• Regulatory demands are the primary
catalyst of change.
The Past and The Present
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners60
• More regulatory mandates trying to
stem data loss.
• Businesses will be called upon to react
faster using more calculated methods.
• Potential for corporate and consumer
”breach fatigue.”
The Future
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners61
Do NO thing
The Worst Plan
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners62
Take ACT ion
The Best Plan
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners63
• IT Security has (but has to keep) executive attention
– This is the best opportunity to solve long-standing problems
– Gain management approval now
– Fight symptoms of “breach fatigue”
• Control users with broad authority to production data
– Leaving users unchecked is both an audit exception and an
accident waiting to happen
– Don’t accept that powerful users have to be limitless
• Limit the use of—and necessity for—powerful profiles
– Monitor and report when power is used
Summary
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners64
• SECURITY and COMPLIANCE are not the same
• IBM i ships in an “allow-all” configuration and CORRECTIVE
ACTION must be taken to move to a “deny-all” configuration
• Evaluate coverage and functionality of 1st gen security tools
• OS and tooling should play COMPLEMENTARY ROLES
• RISK can (and should) be reduced; it’s never totally eliminated
Summary
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners65
How Can PowerTech Help Us?
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners66
6 categories of review
Completes in under 5 minutes
Includes executive summary
Accompanied by live review and Q&A
Personalized recommendations
7-day grace period
FREE!
Option 1 — Security Scan
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners67
Did I Remember To Mention…
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners68
System Auditing Controls
Unsecured Profiles
Public Authorities
Password Policy
Administrative Rights
Analyzed by Leading Industry Experts
Option 2 —Risk Assessment
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners69
Other Available Information
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners70
Familiarize yourself with the Ponemon Institute.
Perform cost analysis of a breach:
• Forensic analysis
• Notification
• Lawsuits
• Loss of customer confidence
• Corporate embarrassment
• Suspension of ability to trade
• Lowered business valuation
• Jail terms
A significant breach can be a enterprise killer!
Additional Steps for Cost Justification
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners71
Visit PowerTech online to access:
www.helpsystems.com/powertech
• State of IBM i Security Study
• Online Compliance Guide
• Open source security policy
• Articles
• Webinars/educational events
• White papers
• e-newsletter
• Security solution datasheets
Free Online Resources
© 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners72
Thank You For Joining Me
ROBIN TATAM
Director of Security Technologies
robin.tatam@powertech.com
www.helpsystems.com/powertech

More Related Content

Viewers also liked

Guia candidato puc
Guia candidato pucGuia candidato puc
Guia candidato pucInma Alvarez
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackHelpSystems
 
Cinthya barzallo c-administracion-a
Cinthya barzallo c-administracion-aCinthya barzallo c-administracion-a
Cinthya barzallo c-administracion-aCinthya Barzallo
 
Building your Brand Center with Athento -Smart Document Management-
Building your Brand Center with Athento -Smart Document Management- Building your Brand Center with Athento -Smart Document Management-
Building your Brand Center with Athento -Smart Document Management- Athento
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalJerome Chapolard
 
Pssst... It's Time to get Rid of Pre-Printed Forms
Pssst... It's Time to get Rid of Pre-Printed FormsPssst... It's Time to get Rid of Pre-Printed Forms
Pssst... It's Time to get Rid of Pre-Printed FormsHelpSystems
 
Curso IBM Redes SAN y Almacenamiento con Tivoli
Curso IBM Redes SAN y Almacenamiento con TivoliCurso IBM Redes SAN y Almacenamiento con Tivoli
Curso IBM Redes SAN y Almacenamiento con Tivolicamforma
 
Getting Started with IBM i Security: Event Auditing
Getting Started with IBM i Security: Event AuditingGetting Started with IBM i Security: Event Auditing
Getting Started with IBM i Security: Event AuditingHelpSystems
 
Vorschau 1 / 2010 V&R unipress
Vorschau 1 / 2010 V&R unipress Vorschau 1 / 2010 V&R unipress
Vorschau 1 / 2010 V&R unipress Ich
 
HERRAMIENTAS DEL INTERNET
HERRAMIENTAS DEL INTERNETHERRAMIENTAS DEL INTERNET
HERRAMIENTAS DEL INTERNETbachiita
 
Range Magazine (2011: Issue 2)
Range Magazine (2011: Issue 2)Range Magazine (2011: Issue 2)
Range Magazine (2011: Issue 2)alastairmcmillan
 
Renovaciones y reservas Biblioteca Álvaro Cunqueiro Instituto Cervantes de Da...
Renovaciones y reservas Biblioteca Álvaro Cunqueiro Instituto Cervantes de Da...Renovaciones y reservas Biblioteca Álvaro Cunqueiro Instituto Cervantes de Da...
Renovaciones y reservas Biblioteca Álvaro Cunqueiro Instituto Cervantes de Da...Red de Bibliotecas del Instituto Cervantes
 
Database 101 on IBM i
Database 101 on IBM iDatabase 101 on IBM i
Database 101 on IBM iHelpSystems
 
Vendimia 2012 ponencia
Vendimia 2012 ponenciaVendimia 2012 ponencia
Vendimia 2012 ponenciacarlprom
 
Self Help Legal Software and Unauthorized Practice of Law
Self Help Legal Software and Unauthorized Practice of LawSelf Help Legal Software and Unauthorized Practice of Law
Self Help Legal Software and Unauthorized Practice of LawRichard S. Granat
 
Guia De Estudio Digestivo
Guia De Estudio DigestivoGuia De Estudio Digestivo
Guia De Estudio DigestivoLuciana Yohai
 
Control charts tool
Control charts toolControl charts tool
Control charts toolMohit Singla
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX SecurityHelpSystems
 

Viewers also liked (20)

12 ssi bonprix
12 ssi   bonprix12 ssi   bonprix
12 ssi bonprix
 
Guia candidato puc
Guia candidato pucGuia candidato puc
Guia candidato puc
 
StandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech PackStandGuard Anti-Virus Tech Pack
StandGuard Anti-Virus Tech Pack
 
Cinthya barzallo c-administracion-a
Cinthya barzallo c-administracion-aCinthya barzallo c-administracion-a
Cinthya barzallo c-administracion-a
 
Building your Brand Center with Athento -Smart Document Management-
Building your Brand Center with Athento -Smart Document Management- Building your Brand Center with Athento -Smart Document Management-
Building your Brand Center with Athento -Smart Document Management-
 
Darktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_finalDarktrace_WhitePaper_Needle_final
Darktrace_WhitePaper_Needle_final
 
Pssst... It's Time to get Rid of Pre-Printed Forms
Pssst... It's Time to get Rid of Pre-Printed FormsPssst... It's Time to get Rid of Pre-Printed Forms
Pssst... It's Time to get Rid of Pre-Printed Forms
 
Curso IBM Redes SAN y Almacenamiento con Tivoli
Curso IBM Redes SAN y Almacenamiento con TivoliCurso IBM Redes SAN y Almacenamiento con Tivoli
Curso IBM Redes SAN y Almacenamiento con Tivoli
 
Getting Started with IBM i Security: Event Auditing
Getting Started with IBM i Security: Event AuditingGetting Started with IBM i Security: Event Auditing
Getting Started with IBM i Security: Event Auditing
 
Vorschau 1 / 2010 V&R unipress
Vorschau 1 / 2010 V&R unipress Vorschau 1 / 2010 V&R unipress
Vorschau 1 / 2010 V&R unipress
 
HERRAMIENTAS DEL INTERNET
HERRAMIENTAS DEL INTERNETHERRAMIENTAS DEL INTERNET
HERRAMIENTAS DEL INTERNET
 
Range Magazine (2011: Issue 2)
Range Magazine (2011: Issue 2)Range Magazine (2011: Issue 2)
Range Magazine (2011: Issue 2)
 
Ahli United Bank
Ahli United BankAhli United Bank
Ahli United Bank
 
Renovaciones y reservas Biblioteca Álvaro Cunqueiro Instituto Cervantes de Da...
Renovaciones y reservas Biblioteca Álvaro Cunqueiro Instituto Cervantes de Da...Renovaciones y reservas Biblioteca Álvaro Cunqueiro Instituto Cervantes de Da...
Renovaciones y reservas Biblioteca Álvaro Cunqueiro Instituto Cervantes de Da...
 
Database 101 on IBM i
Database 101 on IBM iDatabase 101 on IBM i
Database 101 on IBM i
 
Vendimia 2012 ponencia
Vendimia 2012 ponenciaVendimia 2012 ponencia
Vendimia 2012 ponencia
 
Self Help Legal Software and Unauthorized Practice of Law
Self Help Legal Software and Unauthorized Practice of LawSelf Help Legal Software and Unauthorized Practice of Law
Self Help Legal Software and Unauthorized Practice of Law
 
Guia De Estudio Digestivo
Guia De Estudio DigestivoGuia De Estudio Digestivo
Guia De Estudio Digestivo
 
Control charts tool
Control charts toolControl charts tool
Control charts tool
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX Security
 

Similar to IBM i Security Expert Uncovers Dirty Little Secret

Getting Started with IBM i Security
Getting Started with IBM i Security Getting Started with IBM i Security
Getting Started with IBM i Security HelpSystems
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008ValueMentor Consulting
 
Revealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i SecurityRevealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i SecurityHelpSystems
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsIBM Security
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene
 
Secure Messaging Done Right
Secure Messaging Done RightSecure Messaging Done Right
Secure Messaging Done Right2sms, LLC
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?PECB
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0AccelOps
 
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Evident.io
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftOSIsoft, LLC
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingPing Identity
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...AGILLY
 

Similar to IBM i Security Expert Uncovers Dirty Little Secret (20)

Getting Started with IBM i Security
Getting Started with IBM i Security Getting Started with IBM i Security
Getting Started with IBM i Security
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
 
Find & fix the flaws in your code
Find & fix the flaws in your codeFind & fix the flaws in your code
Find & fix the flaws in your code
 
Revealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i SecurityRevealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i Security
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Cutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control CostsCutting Through the Software License Jungle: Stay Safe and Control Costs
Cutting Through the Software License Jungle: Stay Safe and Control Costs
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECMRich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
Rich Saglimbene NYC Content 2015 Speaker Data Security for IBM ECM
 
Secure Messaging Done Right
Secure Messaging Done RightSecure Messaging Done Right
Secure Messaging Done Right
 
How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?How to determine a proper scope selection based on ISO 27001?
How to determine a proper scope selection based on ISO 27001?
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0
 
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Catalyst 2015: Patrick Harding
Catalyst 2015: Patrick HardingCatalyst 2015: Patrick Harding
Catalyst 2015: Patrick Harding
 
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
IBM MobileFirst Protect (MaaS360) : Rendre la Messagerie Mobile Gérable et Sé...
 

More from HelpSystems

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020HelpSystems
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...HelpSystems
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar HelpSystems
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos HelpSystems
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsHelpSystems
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de ITHelpSystems
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3HelpSystems
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPAHelpSystems
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3HelpSystems
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2HelpSystems
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1HelpSystems
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringHelpSystems
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudarHelpSystems
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tourHelpSystems
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...HelpSystems
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scriptsHelpSystems
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanHelpSystems
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security ScanHelpSystems
 

More from HelpSystems (20)

El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020El Estado de la Seguridad de IBM i en 2020
El Estado de la Seguridad de IBM i en 2020
 
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...Ciberseguridad  Cómo identificar con certeza dispositivos comprometidos en la...
Ciberseguridad Cómo identificar con certeza dispositivos comprometidos en la...
 
Rbt jdbc odbc webinar
Rbt jdbc odbc webinar Rbt jdbc odbc webinar
Rbt jdbc odbc webinar
 
RPA en 45 minutos
RPA en 45 minutos RPA en 45 minutos
RPA en 45 minutos
 
Webinar go anywhere_mft_scripts
Webinar go anywhere_mft_scriptsWebinar go anywhere_mft_scripts
Webinar go anywhere_mft_scripts
 
Automatización de Procesos de IT
Automatización de Procesos de ITAutomatización de Procesos de IT
Automatización de Procesos de IT
 
Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3Hs 2020-ibmi-marketplace-spanish v3
Hs 2020-ibmi-marketplace-spanish v3
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPACaso de éxito  Zurich automatiza sus procesos críticos de Negocio con RPA
Caso de éxito Zurich automatiza sus procesos críticos de Negocio con RPA
 
Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3Centro de Excelencia en Automatización 3
Centro de Excelencia en Automatización 3
 
Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2Cómo crear un Centro de Excelencia de Automatización 2
Cómo crear un Centro de Excelencia de Automatización 2
 
Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1Construyendo un Centro de Excelencia de Automatización PARTE 1
Construyendo un Centro de Excelencia de Automatización PARTE 1
 
Webinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business MonitoringWebinar Vityl IT & Business Monitoring
Webinar Vityl IT & Business Monitoring
 
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
1 año de RGPD:  3 formas en las que HelpSystems puede ayudar1 año de RGPD:  3 formas en las que HelpSystems puede ayudar
1 año de RGPD: 3 formas en las que HelpSystems puede ayudar
 
Mft 45 minutos
Mft 45 minutosMft 45 minutos
Mft 45 minutos
 
Automate feature tour
Automate feature tourAutomate feature tour
Automate feature tour
 
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
WEBINAR GRABADO Automatización de procesos de IT: tecnologías más usadas, cas...
 
5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts5 problemas del intercambio de archivos mediante scripts
5 problemas del intercambio de archivos mediante scripts
 
CASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San JuanCASO DE ÉXITO: Grupo Banco San Juan
CASO DE ÉXITO: Grupo Banco San Juan
 
Webinar Security Scan
Webinar Security ScanWebinar Security Scan
Webinar Security Scan
 

Recently uploaded

Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 

Recently uploaded (20)

2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 

IBM i Security Expert Uncovers Dirty Little Secret

  • 1. 25 August 2015 Expert Uncovers the “Dirty Little Secret” of IBM i Security !! Security Alert !!
  • 2. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners2 ROBIN TATAM Director of Security Technologies robin.tatam@powertech.com Your Presenter
  • 3. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners3 • Has over 25 years of IBM i experience, including 10 years in security • Is a subject matter expert and award-winning speaker for COMMON • Officially certified by ISACA as an Information Security Manager • Holds more than 20 IBM certifications • Hosts technical presentations on a variety of security topics • Authors articles on security for leading trade journals and newsletters • An award-winning photographer Your Presenter
  • 4. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners4 Security vs. Compliance Security vs. Compliance
  • 5. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners5 Security A state of being whose ultimate objective is to prevent unauthorized or undesired activity Security vs. Compliance
  • 6. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners6 Compliance The adherence to a stated policy or standard Security vs. Compliance
  • 7. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners7 Warning: You can be fully compliant even if the policy or standard does not outline desirable practices! Security vs. Compliance Policy: • Don’t prevent authorized activity • Allow any user to modify data • Permit data to be taken home
  • 8. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners8 The primary goal of a compliance standard is to act as a guideline to help maintain an acceptable level of operating procedures and security. Regulations are: – Not a precise technical roadmap – Have to be interpreted – Often outline a basic minimum Security vs. Compliance
  • 9. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners9 Businesses rely on auditors to be interpreters. Unfortunately, many don’t speak the ‘i’ language. 4.3.2 Privileged account access should… Don’t grant end users *ALLOBJ Security vs. Compliance
  • 10. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners10 Okay SOX, what should I set my system values to?! Regulations don’t usually speak ‘technology’, and certainly don’t speak ‘i’. Security vs. Compliance
  • 11. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners11 Far too many organizations approach compliance as the sole objective without seeing the value to their security. Security vs. Compliance What’s the least I can do and still be able to check the box to say I did it?
  • 12. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners12 Unfortunately, the fact that most organizations have to invest so much to achieve compliance shows how our security has fallen short. Don’t lose sight of security even when your compliance is your primary objective. Security vs. Compliance
  • 13. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners13 Do you have your own regulatory directive? Security vs. Compliance
  • 14. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners14 Maybe you say NO! as you don’t have to deal with PCI, HIPAA, SOX, GLBA, BASEL II, etc. Security vs. Compliance
  • 15. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners15 But everyone should have one Security vs. Compliance
  • 16. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners16 It’s called a Security Policy Security vs. Compliance
  • 17. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners17 A security policy is a map to guide employees and may contain many levels targeted at different audiences, business units, or purposes. Corporate What the business goal is Information Technology How to configure the technology to support the business goals End User Acceptable use policies Security vs. Compliance
  • 18. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners18 How susceptible is my IBM Power Systems server to attack? “I was assured this server was secure!” Why Do We Care? We’re On Power Systems!
  • 19. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners19
  • 20. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners20 The IBM i operating system is secure Why Do We Care? We’re On Power Systems!
  • 21. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners21 Why Do We Care? We’re On Power Systems!
  • 22. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners22 Why Do We Care? We’re On Power Systems! What do you think?
  • 23. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners23 The IBM i operating system is secure Why Do We Care? We’re On Power Systems!
  • 24. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners24 The IBM i operating system is highly securable Why Do We Care? We’re On Power Systems!
  • 25. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners25 Secure Securable A Common Misconception
  • 26. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners26 They’re On To Us!
  • 27. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners27 “Security by obscurity” is no longer a good option… Of course, it never really was! v Hacking for Dummies? Security By Obscurity
  • 28. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners28 But are you using them? IBM i contains numerous world-class security features! A Common Misconception
  • 29. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners29 What’s integrated? – Intrusion Detection System (IDS) – Support for Role-Based Access (RBAC) – Object-level security – Event auditing – Operating system integrity protection – Security exit points What Comes Free (or Cheap)?
  • 30. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners30 What else is needed? – Security exit programs – User provisioning and management – Real-time audit notification – Database monitoring – Audit and compliance reporting and control – Anti-virus software What Upgrades Are Available?
  • 31. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners31 An Alarming State State of IBM i Security
  • 32. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners32 PowerTech uses anonymous audit data from our Compliance Assessment tool to compile an annual study of security statistics. This study (available online) provides a picture of what IBM i shops are currently doing with their security controls. And, year after year, it shows that there is definitely still room (and a need) for improvement! Where Is Improvement Needed? 2015 www.helpsystems.com/powertech resources / white-papers
  • 33. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners33 QSECURITY: System Security Level
  • 34. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners34 Library Authority
  • 35. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners35 Password Frenzy Not too hard to guess your way in!
  • 36. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners36 Who’s Using the Audit Journal?
  • 37. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners37 Managing Network Access Network Access
  • 38. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners38 Exit Point Coverage
  • 39. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners39 Exit Point Coverage
  • 40. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners40 PowerTech Network Security • Modern Browser-based UI • Multi-Partition Aware • Real-time Dashboards • Transaction Reports • Access Control • Alert Notification • On-going development • World-class Support Comprehensive Exit Point Coverage from the leader in IBM i Security
  • 41. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners41 Managing Privileged Users Privileged Users
  • 42. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners42 Programmers Claim they need *ALLOBJ authority to fix production applications System Administrators Claim they need *IOSYSCFG authority to configure and change the system and *SECADM and perhaps *ALLOBJ to reset passwords Operators Claim they need *JOBCTL, *SPLCTL, and *SAVSYS to IPL and do backups and other specialized functions Vendors Can’t imagine running without Security Officer rights Privileged Users
  • 43. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners43 END USER # 427 Oh, and…
  • 44. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners44 Limit Capabilities *NO User Class *PGMR Initial Menu QSYS/MAIN Special Authorities: *ALLOBJ, *JOBCTL Operations Navigator END USER # 427 Hackers Aren’t The Only Threat
  • 45. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners45 Endless Examples of Insider Breaches
  • 46. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners46 Don’t ever assume that “my users could not/would not (know how to) do that” because you already gave them a valid login. It CAN Happen To You
  • 47. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners47 The #1 issue cited by auditors is: Control and monitoring of powerful users Auditors Are In Agreement
  • 48. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners48 What defines a powerful user? 1. Carry one or more special authorities 2. Granted private authority 3. Access to a system with permissive public access to production data PLUS the ability to execute commands What is Powerful?
  • 49. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners49 How Many On Each Server (Average)?
  • 50. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners50 5 Mistakes Are Made
  • 51. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners51 Grant access to privileges on an as-needed basis. User Actions should be audited to ensure accountability and visibility to each individual’s activities. This is required to satisfy virtually all regulatory mandates worldwide. Mitigate This!
  • 52. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners52 PowerTech Authority Broker User profile lacks necessary authority Switch profile request submitted Authority increased Comprehensive Reporting Profile Swap Alerts Separation of Duties
  • 53. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners53 PowerTech Authority Broker
  • 54. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners54 PowerTech Authority Broker Easy-to-read (and searchable) visibility to: • Interactive SQL • Data File Utility (DFU) • System Service Tools (SST) • Program Development Manager
  • 55. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners55 A Common Myth A Common Myth
  • 56. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners56 ‘i’ can contract a virus! Long thought to be immune to the virus threat, IBM i can actually act as the source of virus problems on your network. Virus activity can be discovered on: • Mapped Drives • FTP • Image Catalogs • Backup Tapes • High Availability A Common Myth
  • 57. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners57 Who’s Scanning For Viruses?
  • 58. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners58 Where Next? Wrapping Up
  • 59. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners59 • Data is secured by out-of-date methods (if at all). • Management assumes data is secured as no one is advising them otherwise. • Regulatory demands are the primary catalyst of change. The Past and The Present
  • 60. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners60 • More regulatory mandates trying to stem data loss. • Businesses will be called upon to react faster using more calculated methods. • Potential for corporate and consumer ”breach fatigue.” The Future
  • 61. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners61 Do NO thing The Worst Plan
  • 62. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners62 Take ACT ion The Best Plan
  • 63. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners63 • IT Security has (but has to keep) executive attention – This is the best opportunity to solve long-standing problems – Gain management approval now – Fight symptoms of “breach fatigue” • Control users with broad authority to production data – Leaving users unchecked is both an audit exception and an accident waiting to happen – Don’t accept that powerful users have to be limitless • Limit the use of—and necessity for—powerful profiles – Monitor and report when power is used Summary
  • 64. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners64 • SECURITY and COMPLIANCE are not the same • IBM i ships in an “allow-all” configuration and CORRECTIVE ACTION must be taken to move to a “deny-all” configuration • Evaluate coverage and functionality of 1st gen security tools • OS and tooling should play COMPLEMENTARY ROLES • RISK can (and should) be reduced; it’s never totally eliminated Summary
  • 65. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners65 How Can PowerTech Help Us?
  • 66. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners66 6 categories of review Completes in under 5 minutes Includes executive summary Accompanied by live review and Q&A Personalized recommendations 7-day grace period FREE! Option 1 — Security Scan
  • 67. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners67 Did I Remember To Mention…
  • 68. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners68 System Auditing Controls Unsecured Profiles Public Authorities Password Policy Administrative Rights Analyzed by Leading Industry Experts Option 2 —Risk Assessment
  • 69. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners69 Other Available Information
  • 70. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners70 Familiarize yourself with the Ponemon Institute. Perform cost analysis of a breach: • Forensic analysis • Notification • Lawsuits • Loss of customer confidence • Corporate embarrassment • Suspension of ability to trade • Lowered business valuation • Jail terms A significant breach can be a enterprise killer! Additional Steps for Cost Justification
  • 71. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners71 Visit PowerTech online to access: www.helpsystems.com/powertech • State of IBM i Security Study • Online Compliance Guide • Open source security policy • Articles • Webinars/educational events • White papers • e-newsletter • Security solution datasheets Free Online Resources
  • 72. © 2015 HelpSystems, LLC. All trademarks and registered trademarks are the property of their respective owners72 Thank You For Joining Me ROBIN TATAM Director of Security Technologies robin.tatam@powertech.com www.helpsystems.com/powertech