Loading…
Unlock the Power of IBM i at POWERUp 2026!

Join us in New Orleans, Louisiana for POWERUp 2026, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Type: Security clear filter
arrow_back View All Dates
Monday, April 27
 

10:00am CDT

IBM i Security Basics
Monday April 27, 2026 10:00am - 12:15pm CDT
This is an "IBM i Security 101" double-session. We will cover IBM i security topics from the basics (user profiles, system values, and object authority) through more advanced topics (adopted authority, authority checking, IFS considerations, audit journaling, and a multi-layer defensive posture). We'll cover some of these topics from the traditional "greenscreen" as well as Navigator for i. This session is intended to "scratch the surface" on a wide range of IBM i security concepts.

Learning Objectives:

"Learn and understand how security is implemented in the IBM i platform: 1. User/group profiles 2. System values 3. Object-level authority "
Speakers
avatar for Steve Riedmueller

Steve Riedmueller

Director of Security Services, Kisco
Monday April 27, 2026 10:00am - 12:15pm CDT
Balcony K

3:15pm CDT

Crack the Code IBM i Security Essentials
Monday April 27, 2026 3:15pm - 4:15pm CDT
IBM i security doesn’t have to be a black box. This session empowers you to take control of your system’s security using the built-in tools of Navigator for i. Whether you're just starting out or refining your expertise, we’ll guide you through essential elements like authority management, object security, audit trails, function usage, and authentication. You’ll learn best practices, how to configure secure settings, and how to use IBM i SQL services to deep dive into activity on your system and strengthen your security. Walk away with actionable insights and hands-on knowledge to confidently secure your IBM i environment. Take aways from this session ️ Apply best practices for Secure Configuration Leverage built-in tools for Monitoring ️How to use Function Usage to enhance your security Sample SQL queries

Learning Objectives:

️ Apply best practices for Secure Configuration Leverage built-in tools for Monitoring ️How to use Function Usage to enhance your security Sample SQL queries
Speakers
avatar for Amy Williams

Amy Williams

Principal Security Consultant, Fortra LLC
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Monday April 27, 2026 3:15pm - 4:15pm CDT
Balcony L

4:30pm CDT

A Hackers View of You
Monday April 27, 2026 4:30pm - 4:50pm CDT
This session is designed to allow you to look through the eyes of a former black hat.

Learning Objectives:

In this session you will learn more about the different type of attackers and what there motivations are. How the large cyber crime organizations operate. Tactics and tools that hackers use to gain access to environments How quantum computers are going to change the data protection and encryption requirements. How the large cyber crime organizations operate.
Speakers
avatar for Tony Owens

Tony Owens

Enterprise Architect, Direct Systems Support
Tony Owens is a recognized figure in the IT industry, particularly known for his expertise in IBM Storage solutions. He has been an IBM Champion since 2020 and has worked with various storage technologies and has contributed to the development and promotion of IBM's storage products... Read More →
Monday April 27, 2026 4:30pm - 4:50pm CDT
Balcony L

4:30pm CDT

Using Navigator for i to Set Up Your TOTP
Monday April 27, 2026 4:30pm - 4:50pm CDT
Think that setting up a time-based one-time password (TOTP) for your IBM i 7.6 profile is complicated? It’s easier than you think! Join us to discover how quick and seamless it is using Navigator for i. This session will demonstrate how both traditional and non-traditional users of Navigator can generate a TOTP key and validate authentication codes using a client authenticator.

Learning Objectives:

`- Understand how to generate a TOTP key using Navigator for i - Learn how to validate authentication codes from a client authenticator
Speakers
avatar for Ann Wilkerson

Ann Wilkerson

Software Developer, IBM
Ann Wilkerson is a lead user interface developer in IBM i. She joined the Rochester lab in 2021 and has since worked on Navigator, IBM i Services, and IBM i Migrate While Active. Her focus areas include security, networking, and the IFS.
Monday April 27, 2026 4:30pm - 4:50pm CDT
Balcony M-N

5:05pm CDT

Explore the Audit Journal Data Mart
Monday April 27, 2026 5:05pm - 5:25pm CDT
The IBM i Audit Journal contains a wealth of security and system activity data, but accessing and analyzing that information efficiently can be a challenge. The Audit Journal Data Mart simplifies this process by transforming raw audit data into a structured format that’s easy to query and visualize. In this session, we’ll explore how the Data Mart enables deeper insights into system events, supports compliance reporting, and enhances security monitoring. Through practical examples and demonstrations, you'll learn how to leverage this powerful tool to make informed decisions and streamline audit analysis.

Learning Objectives:

`- Understand the structure and purpose of the IBM i Audit Journal Data Mart - Learn how to query and analyze audit data for security and compliance use cases
Speakers
avatar for Ann Wilkerson

Ann Wilkerson

Software Developer, IBM
Ann Wilkerson is a lead user interface developer in IBM i. She joined the Rochester lab in 2021 and has since worked on Navigator, IBM i Services, and IBM i Migrate While Active. Her focus areas include security, networking, and the IFS.
Monday April 27, 2026 5:05pm - 5:25pm CDT
Balcony M-N

5:05pm CDT

Using Function Usage to Add another Layer of Security to your IBM i Configuration
Monday April 27, 2026 5:05pm - 5:25pm CDT
The importance of using Function Usage was magnified in IBM 7.6. During this session Carol will describe Function Usage (formerly known as Application Administration) and how to use it to add another layer of security to your IBM i Security strategy.


Learning Objectives:

  • Understand how to access Function Usage
  • Learn what Function Usage controls
  • Understand what was added in IBM i 7.6

Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco
Monday April 27, 2026 5:05pm - 5:25pm CDT
Balcony L
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date - 
  • Artificial Intelligence (AI)
  • Client Connectivity
  • Conference Events
  • Database
  • Developing Business Skills
  • Frameworks
  • General Programming
  • Hardware
  • High Availability Resilience
  • IBM Event
  • IFS
  • IT Leadership and Management
  • IT Strategy
  • NDA
  • Networking
  • PHP
  • Program Testing
  • Programmer Tools
  • Python
  • RPG
  • Security
  • Systems Management
  • Technologies Integrated with IBM i
  • UI
  • Virtualization