Loading…
Unlock the Power of IBM i at POWERUp 2026!

Join us in New Orleans, Louisiana for POWERUp 2026, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Type: Security clear filter
Monday, April 27
 

10:00am CDT

IBM i Security Basics
Monday April 27, 2026 10:00am - 12:15pm CDT
This is an "IBM i Security 101" double-session. We will cover IBM i security topics from the basics (user profiles, system values, and object authority) through more advanced topics (adopted authority, authority checking, IFS considerations, audit journaling, and a multi-layer defensive posture). We'll cover some of these topics from the traditional "greenscreen" as well as Navigator for i. This session is intended to "scratch the surface" on a wide range of IBM i security concepts.

Learning Objectives:

"Learn and understand how security is implemented in the IBM i platform: 1. User/group profiles 2. System values 3. Object-level authority "
Speakers
avatar for Steve Riedmueller

Steve Riedmueller

Director of Security Services, Kisco
Monday April 27, 2026 10:00am - 12:15pm CDT
Balcony K

3:15pm CDT

Crack the Code IBM i Security Essentials
Monday April 27, 2026 3:15pm - 4:15pm CDT
IBM i security doesn’t have to be a black box. This session empowers you to take control of your system’s security using the built-in tools of Navigator for i. Whether you're just starting out or refining your expertise, we’ll guide you through essential elements like authority management, object security, audit trails, function usage, and authentication. You’ll learn best practices, how to configure secure settings, and how to use IBM i SQL services to deep dive into activity on your system and strengthen your security. Walk away with actionable insights and hands-on knowledge to confidently secure your IBM i environment. Take aways from this session ️ Apply best practices for Secure Configuration Leverage built-in tools for Monitoring ️How to use Function Usage to enhance your security Sample SQL queries

Learning Objectives:

️ Apply best practices for Secure Configuration Leverage built-in tools for Monitoring ️How to use Function Usage to enhance your security Sample SQL queries
Speakers
avatar for Amy Williams

Amy Williams

Principal Security Consultant, Fortra LLC
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Monday April 27, 2026 3:15pm - 4:15pm CDT
Balcony L

4:30pm CDT

A Hackers View of You
Monday April 27, 2026 4:30pm - 4:50pm CDT
This session is designed to allow you to look through the eyes of a former black hat.

Learning Objectives:

In this session you will learn more about the different type of attackers and what there motivations are. How the large cyber crime organizations operate. Tactics and tools that hackers use to gain access to environments How quantum computers are going to change the data protection and encryption requirements. How the large cyber crime organizations operate.
Speakers
avatar for Tony Owens

Tony Owens

Enterprise Architect, Direct Systems Support
Tony Owens is a recognized figure in the IT industry, particularly known for his expertise in IBM Storage solutions. He has been an IBM Champion since 2020 and has worked with various storage technologies and has contributed to the development and promotion of IBM's storage products... Read More →
Monday April 27, 2026 4:30pm - 4:50pm CDT
Balcony L
 
Tuesday, April 28
 

8:00am CDT

IBM i Security – What’s new in IBM i 7.6
Tuesday April 28, 2026 8:00am - 9:00am CDT
Come learn about the security features included in the latest operating system release IBM i 7.6. Whether exciting, mundane, or even a little scary to consider, there is something that will pique your interest.

Learning Objectives:

Understand new features of IBM i 7.6 including *SYSBAS encryption and a high level overview of the new integrated MFA.
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert has specialized in IT security... Read More →
Tuesday April 28, 2026 8:00am - 9:00am CDT
Studio 7-8

9:15am CDT

Wizardry & Security: Using Navigator for i to Manage TLS and Certificates
Tuesday April 28, 2026 9:15am - 10:15am CDT
In today’s evolving threat landscape, securing your IBM i environment is no longer optional—it’s essential. Unencrypted sessions invite credential theft and often violate compliance standards. This session will guide you through practical, step-by-step strategies to secure your IBM i using TLS encryption, with a special focus on the powerful capabilities of Navigator for i. We’ll also explore the latest administrative enhancements in Navigator for i, including new wizards and interfaces that simplify day-to-day tasks and help you lock down your system with confidence. Bonus: See how to use the Navigator TLS Wizard to lock down non-secure host servers in IBM i 7.6. Whether your goal is compliance, modernization, or simply better security hygiene, this session will equip you with the tools and knowledge to do it right. Learning objectives: ⚙️ Configure TLS across IBM i servers to protect data in transit. ️Update Access Client Solutions (ACS) configurations to be secure. ➕ Create and manage digital certificates, including using IBM i as a Certificate Authority (CA) or integrating with trusted third-party CAs. Secure Navigator for i using self-signed certificates to ensure your administrative interfaces are protected.

Learning Objectives:

⚙️ Configure TLS across IBM i servers to protect data in transit. ️Update Access Client Solutions (ACS) configurations to be secure. ➕ Create and manage digital certificates, including using IBM i as a Certificate Authority (CA) or integrating with trusted third-party CAs. Secure Navigator for i using self-signed certificates to ensure your administrative interfaces are protected.
Speakers
avatar for Ann Wilkerson

Ann Wilkerson

Software Developer, IBM
Ann Wilkerson is a lead user interface developer in IBM i. She joined the Rochester lab in 2021 and has since worked on Navigator, IBM i Services, and IBM i Migrate While Active. Her focus areas include security, networking, and the IFS.
avatar for Amy Williams

Amy Williams

Principal Security Consultant, Fortra LLC
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Tuesday April 28, 2026 9:15am - 10:15am CDT
Galerie 5

3:15pm CDT

A Practical Guide to IBM i Authority Collection
Tuesday April 28, 2026 3:15pm - 4:15pm CDT
This session explores practical applications for Authority Collection, including standard and "creative" use cases. Authority Collection can be used to reduce the security exposure of privileged user profiles and to lock down objects/libraries/IFS. This session covers the different types of authority collection, how to turn them on/off, how to review and understand the data, and how to turn that knowledge into action. We will cover these things in detail, along with some “outside the box” ways of using this technology to answer questions and solve problems.

Learning Objectives:

"Learn how to: 1. Enable the different types of Authority Collection 2. Analyze data from the Authority Collection repository 3. Turn the data into actionable information 4. Harness the power of Authority Collection in creative ways"
Speakers
avatar for Steve Riedmueller

Steve Riedmueller

Director of Security Services, Kisco
Tuesday April 28, 2026 3:15pm - 4:15pm CDT
Studio 3-4

4:30pm CDT

How AI is Transforming IBM i Security
Tuesday April 28, 2026 4:30pm - 4:50pm CDT
Artificial intelligence is reshaping the security landscape, and IBM i environments are no exception. As AI-driven technologies become integral to enterprise operations, they introduce both unprecedented opportunities and new vulnerabilities. This session examines how AI is influencing IBM i security—from accelerating threat detection and predictive risk analysis to redefining compliance and access control strategies. We’ll explore practical examples such as free and company endorsed AI chatbots and how they can enable inexperienced users to bypass security configurations. Attendees will leave with a better understanding of AI’s dual role as a security enabler and a potential attack vector, along with actionable guidance for enhancing IBM i security approach to this evolving paradigm.

Learning Objectives:

Attendees will leave with a better understanding of AI’s dual role as a security enabler and a potential attack vector, along with actionable guidance for enhancing IBM i security approach to this evolving paradigm.
Speakers
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer & IBM Power Champion, Fortra LLC
Sandi Moore is a Senior Solutions Engineer at Fortra with over 20 years of experience supporting systems monitoring and security software. She works extensively with IBM i environments and has been involved in product demonstrations, implementations, support, training, research, and... Read More →
avatar for Amy Williams

Amy Williams

Principal Security Consultant, Fortra LLC
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Tuesday April 28, 2026 4:30pm - 4:50pm CDT
Studio 7-8

5:05pm CDT

IBM i 7.6 System Service Tools (SST/DST) Integrated MFA
Tuesday April 28, 2026 5:05pm - 5:25pm CDT
This session will cover how to configure and use the new MFA support inside of SST. This is a first great bite to take on the way to full system MFA.

Learning Objectives:

Understand how to setup and configure MFA in IBM i SST
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert has specialized in IT security... Read More →
Tuesday April 28, 2026 5:05pm - 5:25pm CDT
Studio 7-8
 
Wednesday, April 29
 

8:00am CDT

Learn How to Identify IBM i Security Gaps and Prove Compliance
Wednesday April 29, 2026 8:00am - 9:00am CDT
Not sure how secure your IBM i system really is—or how to prove it during an audit? This session is your roadmap to evaluating your system’s security posture with clarity. We’ll break down key IBM i security concepts like authority management, object security, audit trails, function usage, and authentication using Navigator for i. Learn how to interpret audit requests, uncover hidden vulnerabilities, and generate the right reports to demonstrate compliance. Plus, discover how the Audit Journal Data Mart can provide deeper visibility into system activity. Whether you're preparing for an audit or simply want to understand your system’s strengths and gaps, this session will help you move from uncertainty to confidence. In this session you will gain: Understanding of core IBM i security concepts ✅ Interpret and respond to common audit requirements Leverage built in tools for enhanced visibility

Learning Objectives:

Understanding of core IBM i security concepts ✅ Interpret and respond to common audit requirements Leverage built in tools for enhanced visibility
Speakers
avatar for Amy Williams

Amy Williams

Principal Security Consultant, Fortra LLC
Amy Williams is a Principal Security Services Consultant at Fortra, where she has worked since 2015. She holds CISSP, CISA, and PCI-P certifications and has nearly 30 years of experience on the IBM i platform across system administration, architecture, and application security in... Read More →
Wednesday April 29, 2026 8:00am - 9:00am CDT
Balcony L

8:00am CDT

IBM i Integrated MFA Solution
Wednesday April 29, 2026 8:00am - 10:15am CDT
The exciting new 7.6 IBM i integrated MFA solution includes multiple features. Come learn what is possible and how the features can be combined to secure your system. We will Deep Dive on TOTP. The integrated IBM i MFA solution's primary new feature is Time-based One Time Password (TOTP) authentication implemented as a user profile attribute. We will discuss details on the implementation and expand on configuration and use.

Learning Objectives:

Understand how to setup MFA on IBM i 7.6 Understand how MFA affects various types of user authentications
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert has specialized in IT security... Read More →
Wednesday April 29, 2026 8:00am - 10:15am CDT
Galerie 2

9:15am CDT

Making the most of DCM certificate resources
Wednesday April 29, 2026 9:15am - 10:15am CDT
These days, using TLS to secure connections is a required practice. But if you are unfamiliar with generating public and private keys, working with certificates and using DCM to secure your IBM i apps, things can be a little intimidating. What if I do it wrong? How can I use third party certificate providers and how does it all work with my domain registrar? There are many moving parts in the TLS world. This session will focus on describing the parts and how they work together with DCM to sanely manage your secure access on IBM i.

Learning Objectives:

1) Learn the basic components of TLS. 2) See how each relates to the IBM i 3) Step through the process on IBM i DCM 4) Look at 3rd party tools and certificate providers like Letsencrypt and see how to leverage them on IBM i
Speakers
avatar for Pete Helgren

Pete Helgren

Owner/Consultant, Value Added Software
Pete is a developer with broad experience across multiple languages and platforms, including over 30 years of system 3X/AS400/iSeries/IBM i experience. He holds certifications as a GIAC Cloud Penetration Tester, GIAC Secure Software Programmer-Java, AWS Certified Cloud Practitioner... Read More →
Wednesday April 29, 2026 9:15am - 10:15am CDT
Balcony L

3:45pm CDT

Demystifying Integrated File System Security for Modern Secure Workloads
Wednesday April 29, 2026 3:45pm - 4:45pm CDT
The Integrated File System (IFS) remains one of the most overlooked areas in IBM i security. Many organizations either underestimate the risks posed by an unsecured IFS or lack clarity on how to effectively protect it. This oversight can leave sensitive data vulnerable to unauthorized access, manipulation, malware, and theft. In this session, attendees will learn practical strategies for securing the IFS and discover the tools and configurations necessary to implement robust protections. We’ll also explore the latest security features introduced in IBM i 7.6, which offer expanded capabilities to safeguard the IFS environment.

Learning Objectives:

Learn practical strategies for securing the IFS Discover the tools and configurations necessary to implement robust protections Explore the latest security features introduced in IBM i 7.6
Speakers
avatar for Justin Nelson

Justin Nelson

Advisory Software Engineer, IBM
Justin Nelson is a software developer within IBM i development. He has worked on the IBM i since joining IBM in 2015. He is a member of the integrated file system & servers (IFS) team and specializes in the Network Client File System (QNTC), host servers, and Network Authentication... Read More →
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer & IBM Power Champion, Fortra LLC
Sandi Moore is a Senior Solutions Engineer at Fortra with over 20 years of experience supporting systems monitoring and security software. She works extensively with IBM i environments and has been involved in product demonstrations, implementations, support, training, research, and... Read More →
Wednesday April 29, 2026 3:45pm - 4:45pm CDT
Galerie 3
 
Thursday, April 30
 

9:15am CDT

From Logs to Action, Integrating IBM i into Your SIEM Ecosystem
Thursday April 30, 2026 9:15am - 10:15am CDT
IBM i systems often run critical business applications but remain invisible to most security teams. A SIEM (Security Information and Event Management) platform helps centralize and analyze security data for threat detection and compliance—but what does that mean for IBM i? This session defines SIEM, outlines key IBM i data sources like audit journals and system logs. Learn how to make IBM i a visible, actionable part of your security strategy.

Learning Objectives:

Define SIEM and its role in security and compliance. Identify IBM i data sources relevant to SIEM. Explore integration options for improved visibility and monitoring.
Speakers
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer & IBM Power Champion, Fortra LLC
Sandi Moore is a Senior Solutions Engineer at Fortra with over 20 years of experience supporting systems monitoring and security software. She works extensively with IBM i environments and has been involved in product demonstrations, implementations, support, training, research, and... Read More →
Thursday April 30, 2026 9:15am - 10:15am CDT
Studio 7-8

3:00pm CDT

Locking Down Your Data: Best practices for Encryption on IBM i
Thursday April 30, 2026 3:00pm - 4:00pm CDT
Encryption is your last line of defense against data breaches but implementing it effectively on IBM i requires the right knowledge and strategy. In this session, we’ll go beyond the “why” and dive into the “how.” We’ll cover what is sensitive data and what data you should be encrypting. We’ll cover the technical methods for encrypting sensitive data on IBM i, from disk level encryption to integrated encryption solutions. We’ll also explore key management, performance trade-offs, compliance considerations, and practical scenarios where one approach might be more effective than another. Attendees will walk away with actionable knowledge to evaluate encryption methods and sustainable encryption strategy for their IBM i environment.

Learning Objectives:

Understanding of the available encryption methods on IBM i How to evaluate your encryption requirements Actionable list of next steps to start your encryption implementation
Speakers
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer & IBM Power Champion, Fortra LLC
Sandi Moore is a Senior Solutions Engineer at Fortra with over 20 years of experience supporting systems monitoring and security software. She works extensively with IBM i environments and has been involved in product demonstrations, implementations, support, training, research, and... Read More →
avatar for Megan Olson

Megan Olson

Software Developer and Product Manager, Fortra
Megan Olson is a Software Engineer and Product Manager at Fortra. Megan began her career at Fortra in 2021 as a Software Engineer Intern after earning her degree in Software Development in 2020. She has a strong technical focus on system security, product development, and driving... Read More →
Thursday April 30, 2026 3:00pm - 4:00pm CDT
Studio 9-10

4:15pm CDT

Ransomware and IBM i
Thursday April 30, 2026 4:15pm - 5:15pm CDT
Today, there are no known ransomware viruses that run directly on IBM i. However, that does not mean that the IBM i is not at risk. In this practical session, you will learn how to keep your IBM i system safe from Ransomware attacks. Don't miss this critical session! COMMON GOLD medal session.

Learning Objectives:

Understand the threats to IBM i Implement practices to protect the IBM i from those threats
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert has specialized in IT security... Read More →
Thursday April 30, 2026 4:15pm - 5:15pm CDT
Studio 3-4
 

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
  • Artificial Intelligence (AI)
  • Client Connectivity
  • Conference Events
  • Database
  • Developing Business Skills
  • Frameworks
  • General Programming
  • Hardware
  • High Availability Resilience
  • IBM Event
  • IFS
  • IT Leadership and Management
  • IT Strategy
  • NDA
  • Networking
  • PHP
  • Program Testing
  • Programmer Tools
  • Python
  • RPG
  • Security
  • Systems Management
  • Technologies Integrated with IBM i
  • UI
  • Virtualization