Loading…
Attending this event?
THE BEST IBM i & POWER SYSTEMS EDUCATION.When you come to POWERUp, you’ll be able to customize your experience. Choose from 300 sessions, covering over 20 areas of IT, when you plan your schedule. Visit the largest Expo of its kind and meet the experts behind the solutions. Attend social events to meet renowned speakers and peers alike. This conference is structured to give you the pure education and professional connections needed to best enhance your career. Are you ready to POWERUp?

Exhibitor Hall: https://www.expocad.com/host/fx/common/s24/exfx.html

Exhibitor Hall Map Here 
Wednesday, May 22 • 8:00am - 9:00am
149: Discovering your IBM i Data – For Security Administrators Issues

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

There’s plenty information on IBM i that is so valuable for the daily tasks. Many commands, APIs, and SQL functions, let you gather information from your IBM i. You can exploit it online, or build your own database tables with it.

I like to dig into this info. There is always something new to discover. Particularly related to security administration activities: analyzing user profiles, object ownership and authorities, authority lists, program adoptions, exit programs implemented, exploiting audit journal entries, analyzing Db2 activities, and the list goes on and on. All this information is as valuable to IT System Managers, as it is enterprise information to Business executives. You need to understand, evaluate, and take advantage of this knowledge.

In this session we will review the different types of system information you can find on IBM i, that are important for Security Administrators. We’ll also analyze different case studies of how to interpret and prepare the info for future exploitation.

Learning Objectives:
Identify different kinds of Information available in your IBM i
Analyze different ways of obtaining and/or finding this information in your systems.
Prepare information for better use with modern tools.

Speakers
avatar for Cecilia Howlin

Cecilia Howlin

Owner, PYRAMIS S.R.L.
Cecilia Howlin has been working on this platform from the very beginning. On her first job at IBM Argentina, she learned S/38. And never left the platform, since she thinks it never appeared other operating system as good as this one.She usually worked on technical issues, like installing... Read More →


Wednesday May 22, 2024 8:00am - 9:00am CDT
Meeting Room 201A 1508 Houston St, Fort Worth, TX 76102
  Security
  • Session Level Intermediate
  • Audience Security Administrators and Security Auditors who need to find and exploit System Information related to Security