Loading…
Unlock the Power of IBM i at POWERUp 2026!

Join us in New Orleans, Louisiana for POWERUp 2026, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Type: Security clear filter
arrow_back View All Dates
Tuesday, April 28
 

8:00am CDT

IBM i Security – What’s new in IBM i 7.6
Tuesday April 28, 2026 8:00am - 9:00am CDT
Come learn about the security features included in the latest operating system release IBM i 7.6. Whether exciting, mundane, or even a little scary to consider, there is something that will pique your interest.

Learning Objectives:

Understand new features of IBM i 7.6 including *SYSBAS encryption and a high level overview of the new integrated MFA.
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert has specialized in IT security... Read More →
Tuesday April 28, 2026 8:00am - 9:00am CDT
Studio 7-8

9:15am CDT

Securing Your System Without Destroying Your Business
Tuesday April 28, 2026 9:15am - 10:15am CDT
The potential to break a critical process when changing your security configuration is real. But with the proper investigation and analysis, security changes can occur without disrupting your business. During this session Steve Riedmueller and Carol Woodbury will provide the methods they use to investigate a system prior to making changes. Their goal is to give you the confidence to make system value, user profile and object authority changes with confidence and without fear of breakage.

Learning Objectives:

Learn: - how to effectively communicate the need to make security changes. - which configuration changes can be made without a huge project - how and when to use the audit journal to perform analysis - about authority collection analysis
Speakers
avatar for Steve Riedmueller

Steve Riedmueller

Director of Security Services, Kisco
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco
Tuesday April 28, 2026 9:15am - 10:15am CDT
Galerie 6

9:15am CDT

Wizardry & Security: Using Navigator for i to Manage TLS and Certificates
Tuesday April 28, 2026 9:15am - 10:15am CDT
In today’s evolving threat landscape, securing your IBM i environment is no longer optional—it’s essential. Unencrypted sessions invite credential theft and often violate compliance standards. This session will guide you through practical, step-by-step strategies to secure your IBM i using TLS encryption, with a special focus on the powerful capabilities of Navigator for i. We’ll also explore the latest administrative enhancements in Navigator for i, including new wizards and interfaces that simplify day-to-day tasks and help you lock down your system with confidence. Bonus: See how to use the Navigator TLS Wizard to lock down non-secure host servers in IBM i 7.6. Whether your goal is compliance, modernization, or simply better security hygiene, this session will equip you with the tools and knowledge to do it right. Learning objectives: ⚙️ Configure TLS across IBM i servers to protect data in transit. ️Update Access Client Solutions (ACS) configurations to be secure. ➕ Create and manage digital certificates, including using IBM i as a Certificate Authority (CA) or integrating with trusted third-party CAs. Secure Navigator for i using self-signed certificates to ensure your administrative interfaces are protected.

Learning Objectives:

⚙️ Configure TLS across IBM i servers to protect data in transit. ️Update Access Client Solutions (ACS) configurations to be secure. ➕ Create and manage digital certificates, including using IBM i as a Certificate Authority (CA) or integrating with trusted third-party CAs. Secure Navigator for i using self-signed certificates to ensure your administrative interfaces are protected.
Speakers
avatar for Ann Wilkerson

Ann Wilkerson

Software Developer, IBM
Ann Wilkerson is a lead user interface developer in IBM i. She joined the Rochester lab in 2021 and has since worked on Navigator, IBM i Services, and IBM i Migrate While Active. Her focus areas include security, networking, and the IFS.
avatar for Amy Williams

Amy Williams

Principal Security Consultant, Fortra LLC
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Tuesday April 28, 2026 9:15am - 10:15am CDT
Galerie 5

3:15pm CDT

A Practical Guide to IBM i Authority Collection
Tuesday April 28, 2026 3:15pm - 4:15pm CDT
This session explores practical applications for Authority Collection, including standard and "creative" use cases. Authority Collection can be used to reduce the security exposure of privileged user profiles and to lock down objects/libraries/IFS. This session covers the different types of authority collection, how to turn them on/off, how to review and understand the data, and how to turn that knowledge into action. We will cover these things in detail, along with some “outside the box” ways of using this technology to answer questions and solve problems.

Learning Objectives:

"Learn how to: 1. Enable the different types of Authority Collection 2. Analyze data from the Authority Collection repository 3. Turn the data into actionable information 4. Harness the power of Authority Collection in creative ways"
Speakers
avatar for Steve Riedmueller

Steve Riedmueller

Director of Security Services, Kisco
Tuesday April 28, 2026 3:15pm - 4:15pm CDT
Studio 3-4

4:30pm CDT

How AI is Transforming IBM i Security
Tuesday April 28, 2026 4:30pm - 4:50pm CDT
Artificial intelligence is reshaping the security landscape, and IBM i environments are no exception. As AI-driven technologies become integral to enterprise operations, they introduce both unprecedented opportunities and new vulnerabilities. This session examines how AI is influencing IBM i security—from accelerating threat detection and predictive risk analysis to redefining compliance and access control strategies. We’ll explore practical examples such as free and company endorsed AI chatbots and how they can enable inexperienced users to bypass security configurations. Attendees will leave with a better understanding of AI’s dual role as a security enabler and a potential attack vector, along with actionable guidance for enhancing IBM i security approach to this evolving paradigm.

Learning Objectives:

Attendees will leave with a better understanding of AI’s dual role as a security enabler and a potential attack vector, along with actionable guidance for enhancing IBM i security approach to this evolving paradigm.
Speakers
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer & IBM Power Champion, Fortra LLC
Sandi Moore is a Senior Solutions Engineer at Fortra with over 20 years of experience supporting systems monitoring and security software. She works extensively with IBM i environments and has been involved in product demonstrations, implementations, support, training, research, and... Read More →
avatar for Amy Williams

Amy Williams

Principal Security Consultant, Fortra LLC
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Tuesday April 28, 2026 4:30pm - 4:50pm CDT
Studio 7-8

4:30pm CDT

Simplifying Access: Single Sign-On Strategies for IBM i
Tuesday April 28, 2026 4:30pm - 4:50pm CDT
Multi-Factor Authentication (MFA) can feel like a hassle. Users groan at the extra steps, while IT teams wrestle with implementation. On the other hand, Single Sign-On (SSO) is often seen as the holy grail of convenience: one login, seamless access. But what does SSO really look like on the IBM i platform? And how is it different from MFA—not just in function, but in purpose? This session will break down the key differences between SSO and MFA, and dive into how SSO works specifically on IBM i. We’ll explore common protocols like Kerberos, SAML, and OAuth, and look at some Identity Providers (IDPs) such as MS Entra, Okta, and IBM Security Verify. You’ll learn which use cases are best suited for SSO, when MFA still makes sense, and how to align both with your broader security strategy.

Learning Objectives:

`- What are the differences between SSO and MFA - What SSO might look like on the IBM i - Protocol trade-offs
Speakers
avatar for Hrithik Govardhan

Hrithik Govardhan

IBM Champion & Software Lead, Rocket Software
Long time Rocketeer working in the Security/MFA/Cloud spaces on Power and Z. Ask me anything about MFA and SSO on Z and i!
Tuesday April 28, 2026 4:30pm - 4:50pm CDT
Balcony I-J

5:05pm CDT

IBM i 7.6 System Service Tools (SST/DST) Integrated MFA
Tuesday April 28, 2026 5:05pm - 5:25pm CDT
This session will cover how to configure and use the new MFA support inside of SST. This is a first great bite to take on the way to full system MFA.

Learning Objectives:

Understand how to setup and configure MFA in IBM i SST
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert has specialized in IT security... Read More →
Tuesday April 28, 2026 5:05pm - 5:25pm CDT
Studio 7-8
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date - 
  • Artificial Intelligence (AI)
  • Client Connectivity
  • Conference Events
  • Database
  • Developing Business Skills
  • Frameworks
  • General Programming
  • Hardware
  • High Availability Resilience
  • IBM Event
  • IFS
  • IT Leadership and Management
  • IT Strategy
  • NDA
  • Networking
  • PHP
  • Program Testing
  • Programmer Tools
  • Python
  • RPG
  • Security
  • Systems Management
  • Technologies Integrated with IBM i
  • UI
  • Virtualization