Loading…
For the vCEC please register at http://comeur.org/common/vcec2020/

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Security [clear filter]
Monday, November 16
 

16:50 CET

Hackers Nightmare
Moderator: Henry Karlsen
Professionals: Carol Woodbury, Guy Marmorat, Alain De Maght
Description: Security is always a hot topic. And in this room, you can discuss it with leading professionals. A chance you should not miss.

Moderators
avatar for Henry Karlsen

Henry Karlsen

CIO, Umoe Restaurants AS
I started my career back in 1987 and became CTO when I was 22 years old, and then CIO in 1994. Now we have 480+ restaurants in Norway, Sweden and Denmark. Our international brands are Burger King, Starbucks, TGI Fridays and LEON. Our local brands are Peppes Pizza, Opus, La Baguette... Read More →

Speakers
avatar for Guy MARMORAT

Guy MARMORAT

IBM i Security Consultant, Resiliane
“For more than twenty years Guy Marmorat has been dedicated to the development of Security Solutions on IBM i (AS/400). He has played a key part in the development and success of Cilasoft, helping to make its software products part of the World-Leading Security and Auditing Suites... Read More →
avatar for Carol Woodbury

Carol Woodbury

President, CTO, Co-Founder, DXR Security
With over 25 years experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security.  During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations.  Carol is passionate... Read More →
avatar for Alan de Maght

Alan de Maght

CISO and DPO, IRIS South Hospitals


Monday November 16, 2020 16:50 - 17:20 CET
Network Track 1
 
Tuesday, November 17
 

16:00 CET

Determining Whether your IBM i Has Been Breached
Perhaps a setting was accidentally changed in a firewall or router which exposed your entire internal network to the Internet. Or perhaps other parts of your organization is seeing evidence of inappropriate activity. Do you know what you’d need to examine to determine if your IBM i had been breached? Based on a real-life incident, Carol Woodbury will walk you through the steps she took to determine whether an IBM i had been breached.

Speakers
avatar for Carol Woodbury

Carol Woodbury

President, CTO, Co-Founder, DXR Security
With over 25 years experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security.  During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations.  Carol is passionate... Read More →


Tuesday November 17, 2020 16:00 - 16:50 CET
Track 2 - Systems and Security
 
Thursday, November 19
 

14:00 CET

Taking a Fresh Look at IBM i Security: Part 1
Are you Using the IBM i Security Features Provided in the Operating System?
IBM i has so many security features, you may not even be aware of them or not know how to make practical use of them. During this workshop Carol Woodbury will be explaining these features and providing practical examples of how to use them to help you effectively manage security on your IBM i. Features to be discussed include: ARE (Application Runtime Expert), Authority Collection, Row and Column Access Control (RCAC), Function Usage (Application Administration) and IBM i Services (SQL views.)

Speakers
avatar for Carol Woodbury

Carol Woodbury

President, CTO, Co-Founder, DXR Security
With over 25 years experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security.  During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations.  Carol is passionate... Read More →


Thursday November 19, 2020 14:00 - 15:20 CET
Workshop Track 4

15:30 CET

Taking a Fresh Look at IBM i Security: Part 2
Determining and Working on your Next Security Project
Many organizations know they need to do something with IBM i Security but have no idea exactly what should be addressed or they have a huge list of IBM i Security projects but don’t know where to start. During this session Carol will discuss how to determine where to start and how to use the features described in the first workshop session to address that issue. Practical examples of how to address various issues such as ransomware, privileged account take-over, and more, will be discussed in detail.

Speakers
avatar for Carol Woodbury

Carol Woodbury

President, CTO, Co-Founder, DXR Security
With over 25 years experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security.  During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations.  Carol is passionate... Read More →


Thursday November 19, 2020 15:30 - 16:50 CET
Workshop Track 4
 
  • Timezone
  • Filter By Date vCEC2020 Common Europe On-line Nov 16 -19, 2020
  • Filter By Venue Online
  • Filter By Type
  • ACS
  • AIX
  • Application Development
  • DB2
  • High Availability
  • Keynote
  • Networking
  • Open Source Languages
  • Open Source Tools
  • RDi
  • Security
  • Storage‎
  • System Management
  • Subject