Loading…
Unlock the Power of IBM i at POWERUp 2026!

Join us in New Orleans, Louisiana for POWERUp 2026, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Type: Security clear filter
arrow_back View All Dates
Wednesday, April 29
 

8:00am CDT

Learn How to Identify IBM i Security Gaps and Prove Compliance
Wednesday April 29, 2026 8:00am - 9:00am CDT
Not sure how secure your IBM i system really is—or how to prove it during an audit? This session is your roadmap to evaluating your system’s security posture with clarity. We’ll break down key IBM i security concepts like authority management, object security, audit trails, function usage, and authentication using Navigator for i. Learn how to interpret audit requests, uncover hidden vulnerabilities, and generate the right reports to demonstrate compliance. Plus, discover how the Audit Journal Data Mart can provide deeper visibility into system activity. Whether you're preparing for an audit or simply want to understand your system’s strengths and gaps, this session will help you move from uncertainty to confidence. In this session you will gain: Understanding of core IBM i security concepts ✅ Interpret and respond to common audit requirements Leverage built in tools for enhanced visibility

Learning Objectives:

Understanding of core IBM i security concepts ✅ Interpret and respond to common audit requirements Leverage built in tools for enhanced visibility
Speakers
avatar for Amy Williams

Amy Williams

Principal Security Consultant, Fortra LLC
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Wednesday April 29, 2026 8:00am - 9:00am CDT
Balcony L

8:00am CDT

IBM i Integrated MFA Solution
Wednesday April 29, 2026 8:00am - 10:15am CDT
The exciting new 7.6 IBM i integrated MFA solution includes multiple features. Come learn what is possible and how the features can be combined to secure your system. We will Deep Dive on TOTP. The integrated IBM i MFA solution's primary new feature is Time-based One Time Password (TOTP) authentication implemented as a user profile attribute. We will discuss details on the implementation and expand on configuration and use.

Learning Objectives:

Understand how to setup MFA on IBM i 7.6 Understand how MFA affects various types of user authentications
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert has specialized in IT security... Read More →
Wednesday April 29, 2026 8:00am - 10:15am CDT
Galerie 2

9:15am CDT

Making the most of DCM certificate resources
Wednesday April 29, 2026 9:15am - 10:15am CDT
These days, using TLS to secure connections is a required practice. But if you are unfamiliar with generating public and private keys, working with certificates and using DCM to secure your IBM i apps, things can be a little intimidating. What if I do it wrong? How can I use third party certificate providers and how does it all work with my domain registrar? There are many moving parts in the TLS world. This session will focus on describing the parts and how they work together with DCM to sanely manage your secure access on IBM i.

Learning Objectives:

1) Learn the basic components of TLS. 2) See how each relates to the IBM i 3) Step through the process on IBM i DCM 4) Look at 3rd party tools and certificate providers like Letsencrypt and see how to leverage them on IBM i
Speakers
avatar for Pete Helgren

Pete Helgren

Owner/Consultant, Value Added Software
Pete is a developer with broad experience across multiple languages and platforms, including over 30 years of system 3X/AS400/iSeries/IBM i experience. He holds certifications as a GIAC Cloud Penetration Tester, GIAC Secure Software Programmer-Java, AWS Certified Cloud Practitioner... Read More →
Wednesday April 29, 2026 9:15am - 10:15am CDT
Balcony L

10:45am CDT

Diving into the Deep End of IBM i Security
Wednesday April 29, 2026 10:45am - 11:45am CDT
What is an authorized pointer? How does the authority checking algorithm really work? What are the performance aspects of IBM i security? Using her knowledge obtained as IBM i Security team leader, Carol Woodbury answers these questions and more, as she takes you into the depths of IBM i security.

Learning Objectives:

Understand the deeply technical aspects of IBM i Security.
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco
Wednesday April 29, 2026 10:45am - 11:45am CDT
Studio 1-2

3:45pm CDT

Demystifying Integrated File System Security for Modern Secure Workloads
Wednesday April 29, 2026 3:45pm - 4:45pm CDT
The Integrated File System (IFS) remains one of the most overlooked areas in IBM i security. Many organizations either underestimate the risks posed by an unsecured IFS or lack clarity on how to effectively protect it. This oversight can leave sensitive data vulnerable to unauthorized access, manipulation, malware, and theft. In this session, attendees will learn practical strategies for securing the IFS and discover the tools and configurations necessary to implement robust protections. We’ll also explore the latest security features introduced in IBM i 7.6, which offer expanded capabilities to safeguard the IFS environment.

Learning Objectives:

Learn practical strategies for securing the IFS Discover the tools and configurations necessary to implement robust protections Explore the latest security features introduced in IBM i 7.6
Speakers
avatar for Justin Nelson

Justin Nelson

Advisory Software Engineer, IBM
Justin Nelson is a software developer within IBM i development. He has worked on the IBM i since joining IBM in 2015. He is a member of the integrated file system & servers (IFS) team and specializes in the Network Client File System (QNTC), host servers, and Network Authentication... Read More →
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer & IBM Power Champion, Fortra LLC
Sandi Moore is a Senior Solutions Engineer at Fortra with over 20 years of experience supporting systems monitoring and security software. She works extensively with IBM i environments and has been involved in product demonstrations, implementations, support, training, research, and... Read More →
Wednesday April 29, 2026 3:45pm - 4:45pm CDT
Galerie 3

5:00pm CDT

IBM i Security with an SQL Chaser, Next Round!
Wednesday April 29, 2026 5:00pm - 6:00pm CDT
In this award-winning session, be prepared to hear Scott Forstie and Carol Woodbury shake up the world of IBM i Security, mixing up new SQL features that allow you to completely do away with the old way you've been investigating and managing your IBM i Security environment. They will also shake up your mind with thoughts of finding vulnerabilities in your code and debate various methods of resolving the issues. Come prepared to have your IBM i Security world a bit shaken.

Learning Objectives:

Understand how SQL can be used to help you secure IBM i Learn why staying current is important Have the knowledge to use the Run SQL Scripts file provided with the session in your workplace
Speakers
avatar for Scott Forstie

Scott Forstie

Senior Technical Staff Member, IBM
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Architect. He has worked on IBM operating system development since joining IBM in 1989.
Scott is a frequently published author, speaker at industry events... Read More →
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco
Wednesday April 29, 2026 5:00pm - 6:00pm CDT
Galerie 3
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date - 
  • Artificial Intelligence (AI)
  • Client Connectivity
  • Conference Events
  • Database
  • Developing Business Skills
  • Frameworks
  • General Programming
  • Hardware
  • High Availability Resilience
  • IBM Event
  • IFS
  • IT Leadership and Management
  • IT Strategy
  • NDA
  • Networking
  • PHP
  • Program Testing
  • Programmer Tools
  • Python
  • RPG
  • Security
  • Systems Management
  • Technologies Integrated with IBM i
  • UI
  • Virtualization