Power Global

 View Only

Are You a Cybersecurity Superstar?

By Stephen Dominguez posted Thu September 30, 2021 12:15 PM

  

Cybersecurity is a hot topic these days and it’s a top-of-mind concern for most organizations. Let’s say that your organization has spent time implementing cybersecurity measures focused on the current attack methods prevalent in the industry. Are you confident that your current measures will be able to mitigate entirely new attack methods that may arise in the future? Are you confident that your cybersecurity safeguards are complete? Are you confident that there are no “holes” in your security defenses? If a hacker defeats some of your safeguards, do you have other cybersecurity measures that will hinder or prevent the security breach?

 

If you were able to answer “yes” to all of the previous questions, Bravo! You are a cybersecurity superstar because based on my experience assessing more than a hundred companies throughout the world, I haven’t encountered any organization in the world with your level of outstanding cybersecurity. However, if you were in the vast majority that weren’t able to easily answer “yes” to all of the previous questions, you’ve got some work to do.

 

IBM Systems Lab Services is in the business of helping clients with their cybersecurity needs. We help clients with short-term onsite or online engagements with tailored solutions following the latest best practices.

 

But if you’d like to learn more about improving your AIX or Linux operating system security, you may find benefit in attending the virtual TechU October 25-28, 2021. .


In the Best Practices for AIX and Linux Security session, I will:

  • Discuss how “defense in depth,” the most critical concept for achieving excellent cybersecurity, can be used to improve your cybersecurity
  • Discuss CIS Controls and how they can be used to improve your AIX/Linux security
  • Discuss CIS Benchmarks and how they can be used to improve your AIX/Linux security
  • Discuss how CIS Implementation Groups can be used to improve your security in a step-by-step methodology
  • Discuss some of the most important tooling related to AIX and Linux security such as SELinux, PowerSC Security Hardening, AIX Trusted Execution and PowerSC Multi-factor Authentication

 

Cybersecurity is a vital part of a successful and protected organization. I would be happy to help you in your efforts and get you to superstar status.

 

Author: https://www.ibm.com/blogs/systems/author/stephendominguez/

2 comments
23 views

Permalink

Comments

Thu November 11, 2021 12:05 PM

Thank you for you comment, @Kelly Nuckolls.  Yes I agree.  Cybersecurity is becoming a major topic in all discussions now, not just among the IT personnel ...​​​

Thu November 11, 2021 09:37 AM

Great info @Stephen Dominguez! Cybersecurity conversations are so important. Security has always been critical, but these topics are becoming more engrained in overarching business conversations, rather than just IT conversations. We've been enjoying the opportunity to help educate about some of the incredible solutions IBM has on the market. It's fun to see the "non-IT" folks get excited about some of these offerings.