Loading…
Unlock the Power of IBM i at POWERUp 2026!

Join us in New Orleans, Louisiana for POWERUp 2026, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Tuesday April 28, 2026 10:45am - 11:45am CDT
A primer for business professionals on Information and Cyber Security (a.k.a “a crash course on security from a security nerd”) This hour session is intended as a fast-paced background primer for the business or IT profession who wants to understand the big picture of “security” (everything outside the IBM i server). Terms, roles and why it’s important to the businesses to understand and address on an ongoing basis. Definitions of “information” and “cyber” security Explanation of threats. External attackers and Internal threats. (Threats are constantly evolving. Addressing them is never “once and done.”) Definition of security roles: CISO, Security Analyst, Incident Response Analysts, Security compliance auditor, security reviewer, Network Engineer, Firewall engineer and help desk. Vectors of attack - phishing (general), phishing (specific or “spear phishing”) and their respective probabilities BEC (Business Email Compromise) SOC reports - what are they? What is a SIEM? Why is it important? Supply chain - being on the receiving end of security reviews as well as assessing your suppliers security Security tools - firewalls, EDR (End point Detection and Response), email filtering, SIEM, DNS protection, name server for Domain, Active Directory, Access Controls Identity Access Management - User IDs for everything, passwords, Single Sign-On Compliance vs. Security (“check the box” vs. a program of continuous improvement) Table top exercises - what they are and why they are important Physical security - don’t forget this detail. Why hack the organization if all you need to do is to steal a backup tape? Recommendation - Develop a program of continuous improvement (Work to keep ahead of the bad guys - or at least not be low hanging fruit)

Learning Objectives:

Provide a big picture understanding for the IT or business professional on the security topic. Help them communicate with and understand us “Security Nerds.”
Speakers
avatar for Robert Nettgen

Robert Nettgen

Senior Consultant, Briteskies
Robert Nettgen wanted a career in radio broadcasting, but saw that profession declining and found better pay working in IT.  A PC developer in the ‘80’s, Rob started administering AS/400s in the early ‘90s for a Radio/TV group owner.  In 1999 Rob accepted a job as IT director... Read More →
Tuesday April 28, 2026 10:45am - 11:45am CDT
Galerie 4

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link