fresche-white-logo

On-demand 60-min Session

IBM i Security: Top 5 Vulnerabilities & Ways to Resolve Them

View the Recording

In 2022, it took companies ~277 days to detect and contain a data breach (IBM Cost of a Data Breach report). While IBM i is one of the most securable systems, misconfigurations can still leave your critical business data vulnerable to cyberattacks. 

No one wants their data vulnerable – especially if your network has been compromised.

Join IBM i security experts Carol Woodbury and Pauline Brazil Ayala for a 60-minute session where they will cover: 

  • Critical vulnerabilities to look for on IBM i systems
  • Effective, automated ways to remediate the issues

Download the powerpoint handout from the session here.

 

Speakers

carol-woodbury

Carol Woodbury
IBM i Security Expert

 

pauline-circle-1

Pauline Brazil Ayala
VP, Compliance & Security Solutions