IBM France and the COMMON France User Club are pleased to invite you to the 12th Edition of the Annual Conference dedicated to IBM i, onsite, at IBM Bois-Colombes, on Tuesday 19 and Wednesday 20 November 2024. The objective of these 2 days is to provide you with high value-added information about the IBM i Platform, both on strategic and technical aspects.
Date: November 19, 2024 | 11:15am – 12:15 (1 hour)
Session: IBM i Audit and Security
S04 – Inventory of methods to strengthen the Security and Auditability of IBM i data
Db2 data access methods will be reviewed, then focusing on the technologies available to improve auditability and protection.
Speaker : Guy Marmorat
You run critical parts of your business on IBM i and you need to address some Security and/or Compliance issues such as, GDPR, NIS2, PCI-DSS, SOX, specifically on this Platform,
Resiliane can help you!
Here are some examples of Services we can deliver:
Improving your Security/Audit Level
Be your part-time Security Officer (for example: 16 hours per month, one day per week, on demand)
Help you in addressing issues listed in Official Audit Reports and/or prepare for your next Official Audit
Perform access violation testing
Do investigation in case of suspected fraudulent activities
Support on Precisely® IBM i Security Solutions | Assure Security (Cilasoft®) | (Monitoring, Reporting & Alerting | Access Control | Multi-Factor Authentication | Elevated Authority Management | Core Distribution Services (CDS – Data Consolisation & Distribution))
Access Violation Tests (Ethical Hacking) take place under your company’s authority in a legal and legitimate way. These tests are essential to evaluate the Security Level of your architectures. An independent expert with strong technical skills on IBM i Security will boost your defense system. Contact us for any questions
Design audit reports on system events and database changes
Design reports on configuration settings
Interpret, recommend, remediate based on any audit reports
Review access control rules – even those implemented via exit programs
Review authentication process
Develop new strategies to allow you to focus on: – Segregation of duties – Privilege user activity monitoring – Protection of critical data – Integrity of the audit trail – SIEM integration
Ad-Hoc consultancy to help you understand and comply with any Business Specific Security, Auditing or Compliance need you have.
Investigation in case of suspected fraudulent activities
Actions we can deliver if you are faced with a suspicious or litigious situation:
Search evidence in your existing logs
Setup a more comprehensive audit trail to improve the evidence available in the future
Produce an independent report by recognized experts that can be used to defend or absolve your company.
Help you in addressing issues listed in external Audit Reports and/or prepare for your next Audit
Review the issues found in previous audit reports
Prepare for future official security audits
Collate security settings and make recommendations
Discuss security practices and make recommendations
Discuss new security measures to be implemented and make recommendations
Remediate when possible
Review, improve and create documentation.
Be your part-time Security Officer
Act as a part-time Security Officer dedicated to the IBM i platform and as such share our expertise with your Company
Create, maintain, automate audit reports ensuring they stay relevant and aligned with your company strategy even if you have an ever changing technical environment
These reports can track system events, database changes, configuration settings, integrity of the audit trail, privileged user activity, exit point events and more
Review the result of the audit reports, recommend and remediate any issues that arise
Monitor deviated activity on the network and accordingly review access control rules implemented in existing exit programs
Monitor and review authentication processes
Setup and maintain protection rules on your critical data.
IBM i Security Session – Remediation: Immersion in 2 different Projects (Go to the Replay) Speaker: Guy MARMORAT Presentation of 2 different remediation projects in terms of complexity of the environment, budget, objectives. We will follow together the important stages that mark these projects: initial situation, construction of the remediation plan, execution, situation to date and controls.
ONLINE EVENT
A DAY FOCUSED ON “OBJECTIF IBM i” Date: October 10, 2024 | 9:30 a.m. to 5:30 p.m. (Paris Time)
Introduction
Twenty 40-minute Sessions that you can choose according to your needs
Panel discussion
Goals: Secure, perpetuate and improve IBM i Remind the Power and Benefits of IBM i Provide ways to enable the sequencing of actions to be carried out and resources to be allocated.
IBM i Security Meetings – IBM France Montpellier
Date: September 17 & 18, 2024 This seminar will allow participants to understand the principles of IBM i Security, to effectively protect the resources of their IBM i(s) and to ensure the integrity of their data.
September 17, 2024, 15:45 – 17:00 (Paris Time)
Session: IBM i Security – “Current and Future Threats on the IBM i Platform”. Speaker: Guy MARMORAT
IBM i Security Webinar Title: Current and Future Threats on IBM i Platform Date: Thrusday 30 may, 2024 at 10:00am (Paris Time) Speaker: Guy Marmorat Organized by: Laurent Mermet, IBM, Partner Technical Specialist Power Systems & Mathieu Ferré.
Real-time analytics, interoperability, mass of data, complexity, performance, availability, cyberthreats, compliance, remote access: The needs of our businesses have evolved significantly The governance and modernization of the bases, their integration, the management of their performance, the protection and security of data, the departure of competent people are major challenges that you must face.
OBJECTIVE OF THIS DAY PROVIDE YOU WITH PRAGMATIC ANSWERS Few slides, solutions, demos, practical advice
Session: “IBM i Data Security” Title : Inventory of different methods for strengthening the Security and Auditability of IBM i Data All technologies available to improve data security are reviewed, along with the modules of Precisely’s “Assure Security” Suite that contribute to this. Date: 07 december 2023 – 15h50 – 16h30 Speaker: Guy MARMORAT
The largest IBM i User Group in the UK i-UG Conference Midlands 2023 Date: Thursday 23rd November 2023 Venue: The Mount Country Manor House Hotel, Wolverhampton Session (12:05-12:50): IBM i Security – Real life technical Case Study Speakers: Guy MARMORAT, Steve BRADSHAW Contact-Us for a Free Webdemo
IBM i Security Meetings
IBM France Montpellier September 20-21, 2023 Registration is closed, contact us and ask for a personalized webdemo
Speakers: Dominique GAYTE: IBM Champion, IBM i Auditor Guy MARMORAT: IBM Champion, IBM i Security and Audit Expert Nathanaël BONNET: IBM Champion, Expert in Development and Integration of IBM i Software Philippe BOURGEOIS: IBM i Consultant Samira BATAOUCHE: Security Partner Technical Specialist Mickael LE FLOCH: IBM Security Architect Leader Steve WILL: CTO IBM i
For: IBM i Customers Participant Profile: Technical
This seminar will allow participants to understand the principles of IBM i Security, to effectively protect the resources of their IBM i(s) and to ensure the integrity of their data. Well-known Experts (3 IBM Champions) will share their knowledge and experience in IBM i Security and especially concrete customer cases.
Philippe BOURGEOIS IBM France – IBM i IT Specialist – IBM Systems Lab Services What’s new in Security for the IBM i, 7.5
Guy MARMORAT Security Expert on IBM i For ITHEIS, he will lead the session on security reinforcement and compliance
This session presents the reinforcement of the IBM i Security and Compliance challenges, with a “vulnerability – remediation” approach. We will offer you a pragmatic method, because it is essential to add common sense to remain effective in this complex subject. “IBM i Thursdays” are co-hosted by IBM, Itheis and its IBM i modernization expert partners.
Do not wait for a Security incident to take you by surprise, damage your sensitive data and impact your business Protect your data against malicious attacks and human error Review your Security measures with a renowened Expert in IBM i
Our methods and advice are tailored to suit each company because each technical context is unique.