{"id":1685,"date":"2023-03-07T11:40:42","date_gmt":"2023-03-07T10:40:42","guid":{"rendered":"https:\/\/www.armonie.group\/how-to-choose-your-ibm-i-cybersecurity-consultant\/"},"modified":"2023-09-14T16:19:50","modified_gmt":"2023-09-14T14:19:50","slug":"how-to-choose-your-ibm-i-cybersecurity-consultant","status":"publish","type":"post","link":"https:\/\/www.armonie.group\/en\/how-to-choose-your-ibm-i-cybersecurity-consultant\/","title":{"rendered":"How to choose your IBM i cybersecurity consultant"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.14.8&#8243; background_color=&#8221;#0c8dc9&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; text_font_size=&#8221;20px&#8221; header_font=&#8221;Poppins|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;43px&#8221; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_align=&#8221;center&#8221; header_2_text_color=&#8221;#01013A&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;||-16px||false|false&#8221; custom_padding=&#8221;30px|30px||30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<h2><b>ID-INFO blog<\/b><\/h2>\n<p><strong><\/strong><\/p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.14.8&#8243; text_font_size=&#8221;20px&#8221; header_font=&#8221;Poppins|700|||||||&#8221; header_text_align=&#8221;center&#8221; header_text_color=&#8221;#FFFFFF&#8221; header_font_size=&#8221;43px&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;30px|30px|30px|30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<h1 class=\"post_link\">How to choose your  <br>IBM i security consultant?<\/h1>\n<p><strong><!-- \/wp:post-content --><\/strong><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; text_text_color=&#8221;#000000&#8243; text_font_size=&#8221;13px&#8221; text_line_height=&#8221;1.4em&#8221; background_color=&#8221;rgba(13,189,224,0.39)&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_padding=&#8221;30px|30px|30px|30px|false|false&#8221; global_colors_info=&#8221;{}&#8221;]<p><i><span style=\"font-weight: 400;\"><\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\"><\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\"><\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Despite all the security advantages that an AS\/400 can offer, current attacks are forcing their owners to implement best practices for their organization: at stake is their ability to ensure continuous production, as well as the various legal risks associated with the possible loss of data.  <\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Bob Losey explains the point of view of Bruce Bading, IBM i security expert.<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\"><\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">With kind permission of Bob Losay. Jan. 2023<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\"><\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\"><\/span><\/i><\/p>\n<p class=\"wsc_post_summary\"><\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.armonie.group\/wp-content\/uploads\/2022\/12\/img_art_ibmi_failles_securite.jpg&#8221; title_text=&#8221;Man programming on a computer, office background&#8221; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; filter_saturate=&#8221;0%&#8221; filter_sepia=&#8221;15%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_3,1_3&#8243; _builder_version=&#8221;4.14.8&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; text_text_color=&#8221;#000000&#8243; header_2_font=&#8221;Poppins||||||||&#8221; header_2_text_color=&#8221;#000000&#8243; header_3_font=&#8221;Poppins|300|||||||&#8221; header_3_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<p><b>IBM i cybersecurity is one of the top priorities of the IBM users I talk to. I&#8217;m fortunate to have worked with Bruce Bading, a true IBM i security expert. With her permission, this is a modified reprint of another publication I wish to share.  <\/b><\/p>\n<p><strong>There are many options when it comes to cybersecurity consultants or managed security service providers. One way of assessing your choices is to ask what security best practices the consultant (or his company) recommends for setting up cyber defenses. Some best practices are driven by massive organizational teams or company results. However, there is another way to develop security guidelines by leveraging CIS controls and benchmarks through membership of CIS SecureSuite.<\/strong><\/p>\n<p><strong>CIS Controls and CIS Benchmarks are security best practices that pave the way for improved defenses through a unique community consensus process. Working with many of the world&#8217;s security professionals, CIS develops global security guidance (CIS Controls) and technology-specific reinforcement configurations (CIS Benchmarks).<\/strong><\/p>\n<p><strong>Let&#8217;s take a look at how Bruce Bading, President of BFB Consulting, uses his CIS SecureSuite membership to strengthen his customers&#8217; cybersecurity. BFB Consulting provides cyber defense services to help organizations improve their cyber policies, compliance requirements and procedures.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Implementing fundamental safety<\/h2>\n<p><span style=\"font-weight: 400;\">With over 40 years&#8217; experience in cybersecurity and regulatory compliance, Mr. Bading has seen the growth and development of various best practices. From his time as CFO of a major industrial company to his years of experience at IBM as a senior cybersecurity consultant, he has learned to leverage the resources of CIS SecureSuite. It relies on CIS Controls, CIS RAM (risk assessment method) and CIS Benchmarks to help customers operationalize fundamental safety. Mr Bading uses CIS-CAT Pro, a configuration assessment tool, to show his customers the security gaps in their configurations: &#8220;<\/span><i><span style=\"font-weight: 400;\">CIS-CAT Pro is a really solid foundation on which you can address any customer and show them. Look, here&#8217;s what the Center for Internet Security tells us you need to do to lock down your systems. You can read what Tony Sager says &#8211; stop chasing the shiny stuff and get back to basics.<\/span><\/i><span style=\"font-weight: 400;\">&#8220;.<\/span><\/p>\n<p> <span style=\"font-weight: 400;\"> Bading has seen first-hand how some customers fall into the &#8220;glitter syndrome&#8221; and chase claims of technical greatness while ignoring basic best practice. &#8220;<\/span><i>\n  <span style=\"font-weight: 400;\">We need to get back to fundamental safety<\/span>\n<\/i><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">&#8220;he insists. Part of this fundamental security includes implementing best practices such as CIS benchmarks and assessing compliance and adherence. Customers should ask whether consultants are members of CIS SecureSuite. If this is the case, they can ask to see their own CIS-CAT Pro results to identify any security gaps in the configuration. The consultant&#8217;s expertise can then help fill these gaps and address any remaining cybersecurity concerns.<\/span><\/span><br><br><\/p>\n<p><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><\/span><\/span><\/p>\n<h2>Safety in hybrid environments<\/h2>\n<p><span style=\"font-weight: 400;\">Bading&#8217;s customers operate in hybrid environments, i.e. on both on-premise and cloud infrastructures. The important thing, says Bading, is to identify the criticality and confidentiality of each data element. It recommends that private information such as personally identifiable information (PII) or other confidential data be stored in a private cloud. For public data, a public cloud is sufficient. Secondly, it&#8217;s essential that organizations harden cloud environments, wherever they&#8217;re hosted. CIS provides security best practices for securely configuring cloud accounts and services on three of the leading providers:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CIS AWS Foundations Benchmark<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CIS Azure Foundations Benchmark<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CIS Google Cloud Platform Foundations Benchmark<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Whatever environment you operate in &#8211; on premise or cloud, public or private &#8211; secure configurations are essential. &#8220;<\/span><i>\n  <span style=\"font-weight: 400;\">And that&#8217;s what we need to communicate to people<\/span>\n<\/i><span style=\"font-weight: 400;\">&#8220;, explains Mr. Bading. &#8220;<\/span><i>\n  <span style=\"font-weight: 400;\">We need to harden these images<\/span>\n<\/i><span style=\"font-weight: 400;\">&#8220;.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><br><br><\/p>\n<h2>Collaborate and connect to the community<\/h2>\n<p><span style=\"font-weight: 400;\">  Bading participated in the CIS community consensus process to help develop the first IBM i Benchmark CIS. He enjoys being connected to a wider cybersecurity community and said, &#8220;<\/span><i><span style=\"font-weight: 400;\">My next goal is to enter some of the other communities.<\/span><\/i><span style=\"font-weight: 400;\">&#8220;CIS communities enable networking with other technical experts, solving security problems and finding consensus on best practices in cybercrime. &#8220;<\/span><i><span style=\"font-weight: 400;\">Professionals took part in the debate<\/span><\/i><span style=\"font-weight: 400;\">&#8220;explains Bading, &#8220;<\/span><i><span style=\"font-weight: 400;\">through a community, they&#8217;ve come full circle. And here&#8217;s what they said collectively. It&#8217;s not just one person, or one company &#8211; it&#8217;s a large group of individuals all conveying the same message.<\/span><\/i><span style=\"font-weight: 400;\">.&#8221;<\/span><br><br><\/p>\n<p><span style=\"font-weight: 400;\"><\/span><\/p>\n<h2>Serious security for serious threats<\/h2>\n<p><span style=\"font-weight: 400;\">&#8220;<\/span><i>\n  <span style=\"font-weight: 400;\">Cybercriminals are serious<\/span>\n<\/i><span style=\"font-weight: 400;\">&#8220;warns Mr. Bading, &#8220;<\/span><i>\n  <span style=\"font-weight: 400;\">and they&#8217;re not afraid to break things.<\/span>\n<\/i><span style=\"font-weight: 400;\">&#8220;. The determination of cybercriminals demonstrates that customers need to be just as serious about implementing best practice and compliance. Cybersecurity is a business issue, not just an IT issue. For BFB Consulting and its customers, CIS SecureSuite Membership provides the resources they need to implement security best practices. &#8220;<\/span><i>\n  <span style=\"font-weight: 400;\">Firewalls and antivirus are no longer enough in the age of malicious AI, fileless and metamorphic malware<\/span>\n<\/i><span style=\"font-weight: 400;\">&#8220;, explains Mr. Bading. &#8220;<\/span><i>\n  <span style=\"font-weight: 400;\">We need to constantly up our game when it comes to security and internal controls<\/span>\n<\/i><span style=\"font-weight: 400;\">.&#8221; By combining the powerful CIS Benchmarks and CIS Controls, CIS SecureSuite Membership helps organizations keep their systems securely configured. It&#8217;s an essential resource for developing genuine basic safety throughout the company.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Find out more at <\/b><a href=\"http:\/\/www.source-data.com\">\n  <b>www.Source-Data.com<\/b>\n<\/a><b>.<\/b><\/p>\n<p>Original article in English: https: <a href=\"https:\/\/www.linkedin.com\/pulse\/how-choose-ibm-i-iseriesas400-cybersecurity-consultant-bob-losey\/\">\/\/www.linkedin.com\/pulse\/how-choose-ibm-i-iseriesas400-cybersecurity-consultant-bob-losey\/<\/a><\/p>\n<p>&nbsp;<\/p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.14.8&#8243; custom_padding=&#8221;|||30px|false|false&#8221; border_width_left=&#8221;1px&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_2_font=&#8221;Montserrat|800|||||||&#8221; header_2_text_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<h2>Other articles you might like<\/h2>[\/et_pb_text][et_pb_blog include_categories=&#8221;15&#8243; show_thumbnail=&#8221;off&#8221; show_more=&#8221;on&#8221; show_author=&#8221;off&#8221; show_categories=&#8221;off&#8221; show_excerpt=&#8221;off&#8221; show_pagination=&#8221;off&#8221; offset_number=&#8221;1&#8243; _builder_version=&#8221;4.14.8&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;Montserrat|600|||||||&#8221; header_text_color=&#8221;#0C71C3&#8243; header_font_size=&#8221;14px&#8221; meta_font=&#8221;Montserrat||||||||&#8221; meta_font_size=&#8221;11px&#8221; read_more_text_color=&#8221;#0C71C3&#8243; read_more_font_size=&#8221;11px&#8221; border_width_bottom_fullwidth=&#8221;1px&#8221; border_color_bottom_fullwidth=&#8221;#0C71C3&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<!-- \/wp:freeform -->","protected":false},"excerpt":{"rendered":"<p>ID-INFO blog How to choose your IBM i security consultant? Despite all the security advantages that an AS\/400 can offer, current attacks are forcing their owners to implement best practices for their organization: at stake is their ability to ensure continuous production, as well as the various legal risks associated with the possible loss of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1507,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[57],"tags":[62,59,75,67,69,71,66,60,64,73],"class_list":["post-1685","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-idinfo-en","tag-as-400-en-2","tag-as400-en-2","tag-cyber-security","tag-data-en","tag-data-en-2","tag-data-security","tag-ibm-power","tag-ibmi-en","tag-power-server","tag-security"],"_links":{"self":[{"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/posts\/1685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/comments?post=1685"}],"version-history":[{"count":11,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/posts\/1685\/revisions"}],"predecessor-version":[{"id":1789,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/posts\/1685\/revisions\/1789"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/media\/1507"}],"wp:attachment":[{"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/media?parent=1685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/categories?post=1685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.armonie.group\/en\/wp-json\/wp\/v2\/tags?post=1685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}