Loading…
Unlock the Power of IBM i at POWERUp 2025!

Join us in Disneyland, California, for POWERUp 2025, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Venue: Adventure clear filter
arrow_back View All Dates
Tuesday, May 20
 

8:00am PDT

Single Sign On (Kerberos) Overview for IBM i
Tuesday May 20, 2025 8:00am - 9:00am PDT
Wouldn’t it be nice to have just one password?  It may be possible using Single Sign On.  In this overview level session, we will discuss how the process works.  We will cover the steps to setup an IBM i in an existing Windows Environment.  Finally, the session will provide some pain points and best practices to consider before implementing Single Sign On.  Time and systems permitting, a live demo of the setup and usage will conclude the session.
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security and Authentication Technology Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert... Read More →
Tuesday May 20, 2025 8:00am - 9:00am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

9:15am PDT

Using Function Usage to add Another Layer to your IBM i Security Defenses
Tuesday May 20, 2025 9:15am - 10:15am PDT
Come to this session to understand what Function Usage (formerly known as Application Administration) is, how to access it, how to implement settings to add an additional layer of security to your IBM i Security strategy and how discover or report on current settings. Carol will also discuss the audit journal entries that are generated by function usage and describe several ways to utilize this information.

 
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
Tuesday May 20, 2025 9:15am - 10:15am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

10:45am PDT

30 Security Tips in 60 Minutes
Tuesday May 20, 2025 10:45am - 11:45am PDT
Security is a big topic, but it doesn’t have to be overwhelming.  Just like weightlifting, where you can start with smaller weights and work your way up, such is the case in cyber security, you can reduce your risk by doing some basic things as you work toward bigger goals.  Examining the most common causes of security failures and a few simple countermeasures can help you take some action now.      
 

 
Speakers
avatar for Robert Nettgen

Robert Nettgen

Senior Consultant, Briteskies
Robert Nettgen wanted a career in radio broadcasting, but saw that profession declining and found better pay working in IT.  A PC developer in the ‘80’s, Rob started administering AS/400s in the early ‘90s for a Radio/TV group owner.  In 1999 Rob accepted a job as IT director... Read More →
Tuesday May 20, 2025 10:45am - 11:45am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

3:15pm PDT

An Introduction to Cyber Security Frameworks
Tuesday May 20, 2025 3:15pm - 4:15pm PDT
Within the realm of “improving security” is a concept called “risk management.”  Within that realm, there are collections of rules, standards, recommendations, requirements and guidelines called “Security Frameworks.”

Cyber security is a lot more than just putting in a firewall, checking a few settings on IBM i, and reminding your coworkers to stop putting passwords on post-it notes pasted to their monitors.

Dive into a foundation of cyber security, best practices, what you should be doing and what you must be doing

Learning Objectives:
  • Get a list of the top policies and procedures for establishing and maintaining security controls across your network.
  • Learn how to implement and maintain compliance procedures across your organization
  • Ideas for gaining “buy in” from those outside the Information Security team and how to convey the importance of information security and compliance.
Speakers
avatar for Robert Nettgen

Robert Nettgen

Senior Consultant, Briteskies
Robert Nettgen wanted a career in radio broadcasting, but saw that profession declining and found better pay working in IT.  A PC developer in the ‘80’s, Rob started administering AS/400s in the early ‘90s for a Radio/TV group owner.  In 1999 Rob accepted a job as IT director... Read More →
Tuesday May 20, 2025 3:15pm - 4:15pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

4:30pm PDT

Break Free from Defaults – Why Keeping Them Can Harm Your System Security!
Tuesday May 20, 2025 4:30pm - 4:50pm PDT
Misconfiguration is still one of the leading causes of data breaches.
IBM i settings can also be misconfigured—either by mistake or neglect.
Not updating the shipped configurations can expose your system.
Find out how you can improve the shipped configuration on your new system or improve the configuration that has been handed down year after year, hardware migration to hardware migration.

During this session, you'll learn about the top IBM i security configuration errors that can make your system, data and organization vulnerable.
 
Speakers
avatar for Amy Williams

Amy Williams

Principal Security Services Consultant, Fortra LLC
Amy Williams is a Senior Security Services Consultant who joined Fortra in 2015. She holds CISSP, CISA, and PCI-P certifications.Amy has worked on the IBM i platform for nearly 30 years and her experience includes application testing, system installation, system administration, and... Read More →
Tuesday May 20, 2025 4:30pm - 4:50pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

5:05pm PDT

IBM i Security: A Dual Responsibility
Tuesday May 20, 2025 5:05pm - 5:25pm PDT
With security breaches making weekly headlines, what is IBM doing to provide us with a secure-able operating system? And once delivered, what are our responsibilities? Or is what IBM's doing sufficient such that we have no additional work or responsibilities? Come and join a lively discussion between Steve Will and Carol Woodbury as they debate these relevant issues.
Speakers
avatar for Steve Will

Steve Will

IBM i CTO & Chief Architect, IBM
Steve is the CTO and Chief Architect for the IBM i Operating System. Spending the past fourteen years of his IBM career in this position, he has become an award-winning speaker, author of the influential blog "You and i," (https://bit.ly/You-and-i-blog) and is one of the most sought-after voices at customer briefings and events. Steve has worked on IBM i and its predecessors since before the creation of the AS/400, and is currently responsible for setting the strategy of the IBM i operating system, as well as deciding which enhancements will be implemented. In his role, he talks to clients and pa... Read More →
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
Tuesday May 20, 2025 5:05pm - 5:25pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -