IBM i Services are provided by Db2 for i and can be used to access and manage the IBM i operating system. This session will include many examples of how to use IBM i Services to modernize administration on IBM i. Invest in understanding this alternative to existing IBM i APIs and commands.
In this new session, Scott will explore the many ways that “bad actors” can attempt to subvert the security on IBM i. Whether the topic is protecting against SQL Injection, closing doors to acquiring elevated privileges, or attempting to discover unprotected objects, this session will include techniques for evaluation and protection of your IBM i. Attend this session to take a big step towards discovering and eliminating attack vectors within Db2 for i!