Fortify Your IBM i: Secure Data, Defend Against Threats

Unlock the Power of Field-Level Encryption and Malware Protection

Is your IBM i ready for modern threats? Join Bill Peedle to explore field-level encryption and key strategies to defend your system from ransomware and malware. Stay secure, stay ahead!

Event Completed!

0

DAYS

0

HOURS

0

MINUTES

0

SECONDS

About Event

Are you ready to level up your IBM i security? Join us for a deep dive into the latest challenges facing IBM i platforms and learn how to stay one step ahead of emerging threats. In this engaging session, Bill Peedle will walk us through modern encryption techniques and malware defenses, ensuring your IBM i stays resilient in today’s digital landscape.

Pre-Session: Disk Level Encryption Is Not Enough
Disk encryption is no longer enough to meet today’s compliance demands. As companies aim to align with PCI and other regulations, they are being asked to encrypt data at the field level. This session will explore why disk-level encryption falls short and how field-level encryption offers more granular protection for sensitive information. If you're serious about safeguarding your data on IBM i, this is a must-attend session.

Main Session: Defending Your IBM i Against Malware
Even the most secure systems can become targets. While IBM i has long been regarded as one of the most secure platforms, the rise of ransomware and malware means it’s now under attack like every other system. In this session, Bill Peedle will share proven strategies for keeping your IBM i safe from malware infections and ransomware attacks. Learn how to prevent breaches before they happen and ensure your IBM i stays secure in the face of modern threats.

Schedule

Pre-Session

Disk Level Encryption Is Not Enough

5:00 PM

Networking & Cocktail Hour

Connect and enjoy our open bar.

6:00 PM

Dinner & Q&A

Interactive session over dinner.

7:00 PM

Main Session

Defending Your IBM i Against Malware

8:00 PM

Session Ends

Wrapping up with gratitude

9:00 PM

What Will You Learn?

Field-Level Encryption

Delve into the growing importance of field-level encryption on the IBM i. Learn how it surpasses traditional disk-level encryption, ensuring that sensitive data remains secure even if the system is compromised. This session explained the steps necessary to transition to field-level encryption and how it aligns with PCI compliance requirements.

IBM i Malware Defense

Explore how the highly securable IBM i platform faces modern cyber threats, including ransomware attacks, if not secured properly. This session provided detailed strategies on identifying vulnerabilities, implementing multi-layered security protocols, and preventing malware from infiltrating the system.

Security Best Practices

Gain firsthand insights from Bill Peedle, a seasoned expert in IBM i administration and security. Learn how to balance security with operational efficiency and apply practical solutions for HA/DR (High Availability/Disaster Recovery). Discover how his experiences with SAP and security pre-sales translate into actionable takeaways to safeguard your IBM i environment.

Keynote Speaker

Bill Peedle Image

Bill Peedle

Technical Pre-Sales Specialist at Precisely

Bill started working on the IBM i in 1990 as an IBM i administrator and developer for a manufacturing company in Michigan. In 1999, he implemented SAP on the IBM i and became the SAP Basis Manager in addition to IBM i administrator. In 2003, Bill joined Lakeview Technology as a MIMIX consultant. Most recently, in 2019, he moved into technical pre-sales for IBM i security with a secondary focus on HA/DR solutions for Precisely.