Gain access to a full day of IBM i security-focused
sessions presented by industry experts.
When it comes to securing your IBM i, it is not a one size fits all approach.
How confident are you in your system’s security?
Are you exposed to threats?
Can you recover from an attack?
When was the last time you reviewed your vulnerabilities?
Not sure where to even start when it comes to securing your system?
The experts from iTech will be on hand to address all
your concerns and answer any questions you may have.
10:00 - 10:15 AM ET
10:15 - 11:00 AM ET
Current IBM i Security Trends & Statistics
11:00 AM - 12:00 PM ET
Defending Your System Against Ransomware
12:15 - 12:45 PM ET
How to Prioritize your Security Threats
Common Missteps in a Security Project
1:00 - 2:00 PM ET
Deconstructing Penetration Testing for IBM i
2:00 - 3:00 PM ET
Common Threats and Practical Solutions
Steve Pitcher & Laurie LeBlanc
3:15 - 4:15 PM ET
Can You Recover From An Attack?
4:15 PM ET
Pete Massiello, Steve Pitcher & Laurie LeBlanc
Do I need to register for each session?
One registration will give you access to all sessions.
The lunch breakout sessions will require you to reserve a seat. Registration for lunch breakouts will be opening soon!
Do I have to pay to attend?
Absolutely not. Our goal is to share our expertise with the IBM i community.
This event is at no cost to you.
How do I join the event?
Once you register, you should receive an automated email from GoToWebinar with details on how to join. This information will be your ticket to join us virtually for the entire day so it is good to keep it handy.
Will handouts and recordings be available?
Yes. Slides and recordings will be available 24-48 hours after the event.
If you have a question not listed here, please reach out to firstname.lastname@example.org.