Join us in New Orleans, Louisiana for POWERUp 2026, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!
Sign up or log in to add sessions to your schedule and sync them to your phone or calendar.
Come learn about the security features included in the latest operating system release IBM i 7.6. Whether exciting, mundane, or even a little scary to consider, there is something that will pique your interest.
Learning Objectives:
Understand new features of IBM i 7.6 including *SYSBAS encryption and a high level overview of the new integrated MFA.
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert has specialized in IT security... Read More →
Tuesday April 28, 2026 8:00am - 9:00am CDT Studio 7-8
The potential to break a critical process when changing your security configuration is real. But with the proper investigation and analysis, security changes can occur without disrupting your business. During this session Steve Riedmueller and Carol Woodbury will provide the methods they use to investigate a system prior to making changes. Their goal is to give you the confidence to make system value, user profile and object authority changes with confidence and without fear of breakage.
Learning Objectives:
Learn: - how to effectively communicate the need to make security changes. - which configuration changes can be made without a huge project - how and when to use the audit journal to perform analysis - about authority collection analysis
In today’s evolving threat landscape, securing your IBM i environment is no longer optional—it’s essential. Unencrypted sessions invite credential theft and often violate compliance standards. This session will guide you through practical, step-by-step strategies to secure your IBM i using TLS encryption, with a special focus on the powerful capabilities of Navigator for i. We’ll also explore the latest administrative enhancements in Navigator for i, including new wizards and interfaces that simplify day-to-day tasks and help you lock down your system with confidence. Bonus: See how to use the Navigator TLS Wizard to lock down non-secure host servers in IBM i 7.6. Whether your goal is compliance, modernization, or simply better security hygiene, this session will equip you with the tools and knowledge to do it right. Learning objectives: ⚙️ Configure TLS across IBM i servers to protect data in transit. ️Update Access Client Solutions (ACS) configurations to be secure. ➕ Create and manage digital certificates, including using IBM i as a Certificate Authority (CA) or integrating with trusted third-party CAs. Secure Navigator for i using self-signed certificates to ensure your administrative interfaces are protected.
Learning Objectives:
⚙️ Configure TLS across IBM i servers to protect data in transit. ️Update Access Client Solutions (ACS) configurations to be secure. ➕ Create and manage digital certificates, including using IBM i as a Certificate Authority (CA) or integrating with trusted third-party CAs. Secure Navigator for i using self-signed certificates to ensure your administrative interfaces are protected.
Ann Wilkerson is a lead user interface developer in IBM i. She joined the Rochester lab in 2021 and has since worked on Navigator, IBM i Services, and IBM i Migrate While Active. Her focus areas include security, networking, and the IFS.
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Tuesday April 28, 2026 9:15am - 10:15am CDT Galerie 5
This session explores practical applications for Authority Collection, including standard and "creative" use cases. Authority Collection can be used to reduce the security exposure of privileged user profiles and to lock down objects/libraries/IFS. This session covers the different types of authority collection, how to turn them on/off, how to review and understand the data, and how to turn that knowledge into action. We will cover these things in detail, along with some “outside the box” ways of using this technology to answer questions and solve problems.
Learning Objectives:
"Learn how to: 1. Enable the different types of Authority Collection 2. Analyze data from the Authority Collection repository 3. Turn the data into actionable information 4. Harness the power of Authority Collection in creative ways"
Artificial intelligence is reshaping the security landscape, and IBM i environments are no exception. As AI-driven technologies become integral to enterprise operations, they introduce both unprecedented opportunities and new vulnerabilities. This session examines how AI is influencing IBM i security—from accelerating threat detection and predictive risk analysis to redefining compliance and access control strategies. We’ll explore practical examples such as free and company endorsed AI chatbots and how they can enable inexperienced users to bypass security configurations. Attendees will leave with a better understanding of AI’s dual role as a security enabler and a potential attack vector, along with actionable guidance for enhancing IBM i security approach to this evolving paradigm.
Learning Objectives:
Attendees will leave with a better understanding of AI’s dual role as a security enabler and a potential attack vector, along with actionable guidance for enhancing IBM i security approach to this evolving paradigm.
Sr. Solutions Engineer & IBM Power Champion, Fortra LLC
Sandi Moore is a Senior Solutions Engineer at Fortra with over 20 years of experience supporting systems monitoring and security software. She works extensively with IBM i environments and has been involved in product demonstrations, implementations, support, training, research, and... Read More →
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Tuesday April 28, 2026 4:30pm - 4:50pm CDT Studio 7-8
Multi-Factor Authentication (MFA) can feel like a hassle. Users groan at the extra steps, while IT teams wrestle with implementation. On the other hand, Single Sign-On (SSO) is often seen as the holy grail of convenience: one login, seamless access. But what does SSO really look like on the IBM i platform? And how is it different from MFA—not just in function, but in purpose? This session will break down the key differences between SSO and MFA, and dive into how SSO works specifically on IBM i. We’ll explore common protocols like Kerberos, SAML, and OAuth, and look at some Identity Providers (IDPs) such as MS Entra, Okta, and IBM Security Verify. You’ll learn which use cases are best suited for SSO, when MFA still makes sense, and how to align both with your broader security strategy.
Learning Objectives:
`- What are the differences between SSO and MFA - What SSO might look like on the IBM i - Protocol trade-offs
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert has specialized in IT security... Read More →
Tuesday April 28, 2026 5:05pm - 5:25pm CDT Studio 7-8