In this new session, Scott will explore the many ways that “bad actors” can attempt to subvert the security on IBM i. Whether the topic is protecting against SQL Injection, closing doors to acquiring elevated privileges, or attempting to discover unprotected objects, this session will include techniques for evaluation and protection of your IBM i. Attend this session to take a big step towards discovering and eliminating attack vectors within Db2 for i!