IBM i Business Continuity 101
Tom Huntington
Ash Giddings
Chuck Losinski
11:00 AM - 12:00 PM CT
How to identify and prevent business disruption in all its forms
Business continuity goes beyond disaster recovery—it’s about your organization’s ability to keep running smoothly during disruption of any kind. That includes viruses and ransomware, performance and processing bottlenecks, accidental or intentional data corruption, and untested backups and role swaps.
In this session, three IBM i experts shine a light on the disruptive incidents that most IT teams overlook and show you the best ways to anticipate these disruptions and maintain business continuity. You’ll learn how to:
-
Calculate the cost of downtime
-
Determine your recovery time objective (RTO)
-
Avoid production configuration issues
You'll also see a live demonstration of Robot HA, the fastest, easiest, and most affordable way for savvy IBM i shops to meet short recovery time objectives and get business back on track after an outage. Remember, the disaster you didn’t plan for always does the most damage. Always. Join us!
Security Bulletin: Malware Infection Discovered on IBM i Server!
Sandi Moore
12:00 PM - 1:00 PM CT
Malicious programs can bring organizations to their knees—and IBM i shops are not immune!
Imagine what would happen to your organization if users couldn't process orders, accept payments, access customer lists, or any number of day-to-day activities.
Despite the rise in crippling malware attacks over the past year, many Power Systems owners still don't see viruses as a risk because they consider them to only be a Windows threat.
It's critical to grasp the true impact malware can have on IBM i and the network that connects to it. Attend this session to gain a thorough understanding of the relationships between:
-
Viruses, native objects, and the integrated file system (IFS)
-
Power Systems and Windows-based viruses and malware
-
PC-based antivirus scanning versus native IBM i scanning
There are a number of ways you can minimize your exposure to malware. IBM i security expert Sandi Moore will explain the facts, including how to ensure you're fully protected.
When JDBC/ODBC Jobs Attack Your IBM i
Chuck Losinski
Terri Preston
1:00 PM - 2:00 PM CT
Real-time job monitoring and control in Robot Monitor
Your IBM i server performance is under attack from the outside, getting hammered by user-submitted queries and external applications, not to mention batch and interactive jobs. You need to know when system performance degrades (and why) or your reputation—and potentially your job—could be on the line!
In this session, our experts show you how proactive job monitoring, notification, and control with Robot Monitor can really save your butt when things go bad. You’ll learn how to:
-
Set up monitoring for database requests: QZDASOINIT, QRWTSRVR, etc.
-
Bring visibility to SQL requests that are hammering your system
-
Watch for long-running batch jobs and other batch issues slowing down throughput
-
Set up notification for jobs consuming too much CPU
-
Report on historical job and subsystem performance
-
Reduce run priority for offending jobs or hold them automatically
Don’t let QZDASOINIT jobs put a stranglehold on system resources while you fly blind. Get to the bottom of job performance issues faster with Robot Monitor. Join us!
Why Your IBM i Security Will Fail (And How to Fix It)
Robin Tatam
2:00 PM - 3:00 PM CT
On IBM i, we tend to focus on securing “green screen” activities or securing by obscurity, trusting that users on the network won’t know what to do anyway. Both approaches share a common flaw: bypassing menu and application restrictions is simple on the majority of IBM i servers.
Thanks to modern network interfaces, anyone with credentials may be able to steal and adamage critical data dn even execute powerful server commands, all without passthrough a single menu or crossing a command line!
In this session with security expert and IBM Champion Robin Tatam, you'll learn:
-
How IBM shipped your system to you with all users granted full access to the database
-
How commands are controlled at four levels
-
How profiles with Limited Capabilities can still run commands
-
The simplest way to prevent unauthorized access to your IFS, your server, and your critical databases
If preventing malicious server access and costly disruption of day-to-day business activities is important for your organization, you don't want to miss this session!
Roundtable: Have You Heard This IBM i Horror Story?
Robin Tatam
Robin Tatam
Ash Giddings
Tom Huntington
Randy Watson
3:00 PM - 4:00 PM CT
Join the experts from HelpSystems as they share their IBM i horror stories. Come and share your story in this interactive session.
There are lots of ways your system can scare you. And the experts at HelpSystems have seen them all. From operations oopsies to security snafus, this team speaks with hundreds of IBM i customers every year and nothing surprises them anymore…or does it?
Don’t miss this hair-raising hour where our expert panel shares real-life horror stories heard from customer sites around the world—anonymously, of course. You’ll learn what happened and how the customer fixed the problem, so you don’t repeat their mistakes. For example:
-
One customer caught hackers attacking their system from the outside
-
Another went from internal to external storage and all hell broke lose
-
A car accident elsewhere turned HQ into a crime scene, and no one could access IBM i
This is also your opportunity to tell your own scary stories, whether you share lessons learned or ask for advice on a current issue. There’s safety in numbers, so let’s come together to keep your IBM i safe and sound.
Join the experts from HelpSystems as they share their IBM i horror stories. Come and share your story in this interactive session.
Fact or Fiction: IBM i Has Never Been Hacked
Robin Tatam
10:00 AM - 11:00 AM
Would attackers ever target the OS known for security and reliability?
Unfortunately, this is fiction.
In this webinar, Robin Tatam explores a well-documented IBM i breach. Despite the many options IBM has provided to protect the system and data, many organizations still struggle to apply appropriate security controls. Protecting the system and the data residing on it requires action.
Robin describes the steps you can take to avoid the mistakes made in this specific case as well as other configurations that can lead to business disruption due to inadequate or misconfigured security settings.
One FACT is that IBM i is secure-able.