Event Date
November 13, 2024
Time
5:00 PM - 9:00 PM
About Event
Are you ready to level up your IBM i security? Join us for a deep dive into the latest challenges facing IBM i platforms and learn how to stay one step ahead of emerging threats. In this engaging session, Bill Peedle will walk us through modern encryption techniques and malware defenses, ensuring your IBM i stays resilient in today’s digital landscape.
Pre-Session: Disk Level Encryption Is Not Enough
Disk encryption is no longer enough to meet today’s compliance demands. As companies aim to align with PCI and other regulations, they are being asked to encrypt data at the field level. This session will explore why disk-level encryption falls short and how field-level encryption offers more granular protection for sensitive information. If you're serious about safeguarding your data on IBM i, this is a must-attend session.
Main Session: Defending Your IBM i Against Malware
Even the most secure systems can become targets. While IBM i has long been regarded as one of the most secure platforms, the rise of ransomware and malware means it’s now under attack like every other system. In this session, Bill Peedle will share proven strategies for keeping your IBM i safe from malware infections and ransomware attacks. Learn how to prevent breaches before they happen and ensure your IBM i stays secure in the face of modern threats.
Schedule
Pre-Session
Disk Level Encryption Is Not Enough
Networking & Cocktail Hour
Connect and enjoy our open bar.
Dinner & Q&A
Interactive session over dinner.
Main Session
Defending Your IBM i Against Malware
Session Ends
Wrapping up with gratitude
What Will You Learn?
Field-Level Encryption
Delve into the growing importance of field-level encryption on the IBM i. Learn how it surpasses traditional disk-level encryption, ensuring that sensitive data remains secure even if the system is compromised. This session explained the steps necessary to transition to field-level encryption and how it aligns with PCI compliance requirements.
IBM i Malware Defense
Explore how the highly securable IBM i platform faces modern cyber threats, including ransomware attacks, if not secured properly. This session provided detailed strategies on identifying vulnerabilities, implementing multi-layered security protocols, and preventing malware from infiltrating the system.
Security Best Practices
Gain firsthand insights from Bill Peedle, a seasoned expert in IBM i administration and security. Learn how to balance security with operational efficiency and apply practical solutions for HA/DR (High Availability/Disaster Recovery). Discover how his experiences with SAP and security pre-sales translate into actionable takeaways to safeguard your IBM i environment.
Keynote Speaker
Bill Peedle
Technical Pre-Sales Specialist at Precisely
Bill started working on the IBM i in 1990 as an IBM i administrator and developer for a manufacturing company in Michigan. In 1999, he implemented SAP on the IBM i and became the SAP Basis Manager in addition to IBM i administrator. In 2003, Bill joined Lakeview Technology as a MIMIX consultant. Most recently, in 2019, he moved into technical pre-sales for IBM i security with a secondary focus on HA/DR solutions for Precisely.