SlideShare a Scribd company logo
1 of 20
How US
Cybersecurity
Executive Order
Impacts IBM i
Customers
Bill Hammond | Director, Product Marketing
Today’s
Security
Landscape
malicious actor
weak password
byod vulnerability
malware
insider threat
evolving attack
elevated authority
ransomware
Malware and Ransomware
3
• A growing range of cyber-attack products and services
• Marketed and sold by a wide range of ‘companies’
• Steady, organized industrialization of cyber-attack tools
and services
• Ransomware as a Service sector
• Operating in the very efficient ‘Dark Web’ marketplace
• Highly developed, broadly marketed, extremely
profitable, industrial-scale
Architecture
of Malware
Attacks
Actively guided
and executed
Stealthy, nearly
invisible
• Not chunks of malicious code /payloads
• Not a single, standardized sequence of
actions
• Skilled human hacker gains access,
studies your systems
• Fully customized and carefully timed
and sequenced
• Nearly impossible to distinguish from
‘normal’ user or application activity
• Main activity is… inactivity
• Quietly evaluates potential targets,
learns your security patterns and gaps,
considers tactics
Immediate
monetary reward
Crypto-Currency
enabled
• Direct payment from victim, not resale of
information
• (Actually, they often do that as well,
even after ransom is paid)
• Hackers world-wide investing heavily in
malware skills development, computing
and network resources
• The “Unmarked Bills” for all 21st
century cyber-extortion
• Easily traded and /or converted to
conventional currencies
• Crypto transactions are (currently)
effectively beyond the reach of law
enforcement agencies and modern
global financial controls.
4
The threat to IBM i
5
IBM i has a sterling reputation for system security and
data protection
• But even IBM itself says that IBM i highly securable,
not inherently secure.
• Still requires all appropriate security options it offers
are properly implemented.
IBM i no longer a Security Island
• IBM i hardware, applications and data are
increasingly integrating with other platforms
• Web partners, service providers, cloud-based e-
commerce systems, more…
Executive Order on
Improving the Nation’s
Cybersecurity
• Policy Improvements
• Removing Barriers to Sharing Threat Information
• Modernizing Federal Government Cybersecurity
• Enhancing Software Supply Chain Security
• Establishing a Cyber Safety Review Board
• Standardizing the Federal Government’s
Playbook for Responding to Cybersecurity
Vulnerabilities and Incidents
• Improving the Federal Government’s
Investigative and Remediation Capabilities
• National Security Systems
Executive Order
Act Now to Protect
Against Potential
Cyberattacks
• Continuing growth in ransomware attacks
• Response to unprecedented economic
sanctions
• Increasing likelihood of foreign, state-
sponsored attacks
• Every organization—large and small—
must be prepared to respond to disruptive
cyber incidents
Strengthening
Cybersecurity
IBM i customer
recommendations
Multi-factor Authentication
Deploy MFA on all systems
IBM i RECOMMENDATIONS
• This is the #1 defense against malware – mitigates risk of
stolen passwords
• Don’t neglect IBM i in your MFA coverage
• Multiple authentication options that align with your budget
and current authenticators
• Use an MFA solution that can protect more than just user
logon
Modern Security Tools
Deploy security tools
IBM i RECOMMENDATIONS
• Highly securable platform but not secure by default
• Understand IBM i security settings and customize for your
company
• Modern tools can continuously look for and mitigate threats
Cybersecurity Expertise
Work with cybersecurity professionals
IBM i RECOMMENDATIONS
• Make sure that your systems are patched and protected
• Testing against all known vulnerabilities
• Change passwords across your networks so that previously
stolen credentials are useless to malicious actors
Data Protection
Back up your data
IBM i RECOMMENDATIONS
• Extend your backup and DR plans to include security
protections
• “Air-gapped” copies of your backups beyond the reach of
malicious actors
• Test your recovery processes from these copies
Security Testing
Run security exercises
IBM i RECOMMENDATIONS
• Test security response plans like you run disaster recovery tests
• Critical to be able to respond quickly to minimize the impact of
any attack
• Coordinate the security testing with you DR testing
• Outside contractors can be very valuable
Data Encryption
Encrypt your data
IBM i RECOMMENDATIONS
• IBM i systems contain high value data including personally
identifiable information (PII)
• Encryption keeps bad actors from reading and using your data
• Encryption is key to many compliance requirements
• Consider both data at rest and data in motion when using
encryption
Employee Education
Educate your employees
IBM i RECOMMENDATIONS
• Include education on common tactics that attackers will use
over email or through websites
• Develop employee education that specifically covers IBM i
access.
• Encourage employees to report if their computers or phones
have shown unusual behavior
Establish Relationships
Initiate connections with
government agencies
IBM i RECOMMENDATIONS
• Please encourage your IT and Security leadership to be
proactive in establishing relationships
• Engage with your local FBI field office or CISA Regional Office
before you need them
• Visit the websites of CISA and the FBI to find technical
information and other useful resources
Questions?
How US Cybersecurity Executive Order Impacts IBM i Customers

More Related Content

Similar to How US Cybersecurity Executive Order Impacts IBM i Customers

43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
dhananjay80
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 

Similar to How US Cybersecurity Executive Order Impacts IBM i Customers (20)

Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
U nit 4
U nit 4U nit 4
U nit 4
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Your cyber security webinar
Your cyber security webinarYour cyber security webinar
Your cyber security webinar
 
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptxWhy-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
Why-Cyber-Security-Matters-Protecting-Your-Business-and-Your-Reputation.pptx
 
Breached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident ResponseBreached! App Attacks, Application Protection and Incident Response
Breached! App Attacks, Application Protection and Incident Response
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 

More from Precisely

How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
Precisely
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Precisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
Precisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
Precisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
Precisely
 

More from Precisely (20)

How to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdfHow to Build Data Governance Programs That Last - A Business-First Approach.pdf
How to Build Data Governance Programs That Last - A Business-First Approach.pdf
 
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter MassendatenZukuntssichere SAP Prozesse dank automatisierter Massendaten
Zukuntssichere SAP Prozesse dank automatisierter Massendaten
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

How US Cybersecurity Executive Order Impacts IBM i Customers

  • 1. How US Cybersecurity Executive Order Impacts IBM i Customers Bill Hammond | Director, Product Marketing
  • 2. Today’s Security Landscape malicious actor weak password byod vulnerability malware insider threat evolving attack elevated authority ransomware
  • 3. Malware and Ransomware 3 • A growing range of cyber-attack products and services • Marketed and sold by a wide range of ‘companies’ • Steady, organized industrialization of cyber-attack tools and services • Ransomware as a Service sector • Operating in the very efficient ‘Dark Web’ marketplace • Highly developed, broadly marketed, extremely profitable, industrial-scale
  • 4. Architecture of Malware Attacks Actively guided and executed Stealthy, nearly invisible • Not chunks of malicious code /payloads • Not a single, standardized sequence of actions • Skilled human hacker gains access, studies your systems • Fully customized and carefully timed and sequenced • Nearly impossible to distinguish from ‘normal’ user or application activity • Main activity is… inactivity • Quietly evaluates potential targets, learns your security patterns and gaps, considers tactics Immediate monetary reward Crypto-Currency enabled • Direct payment from victim, not resale of information • (Actually, they often do that as well, even after ransom is paid) • Hackers world-wide investing heavily in malware skills development, computing and network resources • The “Unmarked Bills” for all 21st century cyber-extortion • Easily traded and /or converted to conventional currencies • Crypto transactions are (currently) effectively beyond the reach of law enforcement agencies and modern global financial controls. 4
  • 5. The threat to IBM i 5 IBM i has a sterling reputation for system security and data protection • But even IBM itself says that IBM i highly securable, not inherently secure. • Still requires all appropriate security options it offers are properly implemented. IBM i no longer a Security Island • IBM i hardware, applications and data are increasingly integrating with other platforms • Web partners, service providers, cloud-based e- commerce systems, more…
  • 6. Executive Order on Improving the Nation’s Cybersecurity
  • 7. • Policy Improvements • Removing Barriers to Sharing Threat Information • Modernizing Federal Government Cybersecurity • Enhancing Software Supply Chain Security • Establishing a Cyber Safety Review Board • Standardizing the Federal Government’s Playbook for Responding to Cybersecurity Vulnerabilities and Incidents • Improving the Federal Government’s Investigative and Remediation Capabilities • National Security Systems Executive Order
  • 8. Act Now to Protect Against Potential Cyberattacks
  • 9. • Continuing growth in ransomware attacks • Response to unprecedented economic sanctions • Increasing likelihood of foreign, state- sponsored attacks • Every organization—large and small— must be prepared to respond to disruptive cyber incidents Strengthening Cybersecurity
  • 11. Multi-factor Authentication Deploy MFA on all systems IBM i RECOMMENDATIONS • This is the #1 defense against malware – mitigates risk of stolen passwords • Don’t neglect IBM i in your MFA coverage • Multiple authentication options that align with your budget and current authenticators • Use an MFA solution that can protect more than just user logon
  • 12. Modern Security Tools Deploy security tools IBM i RECOMMENDATIONS • Highly securable platform but not secure by default • Understand IBM i security settings and customize for your company • Modern tools can continuously look for and mitigate threats
  • 13. Cybersecurity Expertise Work with cybersecurity professionals IBM i RECOMMENDATIONS • Make sure that your systems are patched and protected • Testing against all known vulnerabilities • Change passwords across your networks so that previously stolen credentials are useless to malicious actors
  • 14. Data Protection Back up your data IBM i RECOMMENDATIONS • Extend your backup and DR plans to include security protections • “Air-gapped” copies of your backups beyond the reach of malicious actors • Test your recovery processes from these copies
  • 15. Security Testing Run security exercises IBM i RECOMMENDATIONS • Test security response plans like you run disaster recovery tests • Critical to be able to respond quickly to minimize the impact of any attack • Coordinate the security testing with you DR testing • Outside contractors can be very valuable
  • 16. Data Encryption Encrypt your data IBM i RECOMMENDATIONS • IBM i systems contain high value data including personally identifiable information (PII) • Encryption keeps bad actors from reading and using your data • Encryption is key to many compliance requirements • Consider both data at rest and data in motion when using encryption
  • 17. Employee Education Educate your employees IBM i RECOMMENDATIONS • Include education on common tactics that attackers will use over email or through websites • Develop employee education that specifically covers IBM i access. • Encourage employees to report if their computers or phones have shown unusual behavior
  • 18. Establish Relationships Initiate connections with government agencies IBM i RECOMMENDATIONS • Please encourage your IT and Security leadership to be proactive in establishing relationships • Engage with your local FBI field office or CISA Regional Office before you need them • Visit the websites of CISA and the FBI to find technical information and other useful resources

Editor's Notes

  1. https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
  2. The Biden-Harris Administration has warned repeatedly about the potential for Russia to engage in malicious cyber activity against the United States in response to the unprecedented economic sanctions we have imposed. There is now evolving intelligence that Russia may be exploring options for potential cyberattacks. The Administration has prioritized strengthening cybersecurity defenses to prepare our Nation for threats since day one. President Biden’s Executive Order is modernizing the Federal Government defenses and improving the security of widely-used technology. The President has launched public-private action plans to shore up the cybersecurity of the electricity, pipeline, and water sectors and has directed Departments and Agencies to use all existing government authorities to mandate new cybersecurity and network defense measures. Internationally, the Administration brought together more than 30 allies and partners to cooperate to detect and disrupt ransomware threats, rallied G7 countries to hold accountable nations who harbor ransomware criminals, and taken steps with partners and allies to publicly attribute malicious activity. We accelerated our work in November of last year as Russian President Vladimir Putin escalated his aggression ahead of his further invasion of Ukraine with extensive briefings and advisories to U.S. businesses regarding potential threats and cybersecurity protections. The U.S. Government will continue our efforts to provide resources and tools to the private sector, including via CISA’s Shields-Up campaign and we will do everything in our power to defend the Nation and respond to cyberattacks. But the reality is that much of the Nation’s critical infrastructure is owned and operated by the private sector and the private sector must act to protect the critical services on which all Americans rely.
  3. https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/fact-sheet-act-now-to-protect-against-potential-cyberattacks/