Loading…
Unlock the Power of IBM i at POWERUp 2025!

Join us in Disneyland, California, for POWERUp 2025, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Venue: Room 8 clear filter
arrow_back View All Dates
Tuesday, May 20
 

8:00am PDT

Single Sign On (Kerberos) Overview for IBM i
Tuesday May 20, 2025 8:00am - 9:00am PDT
Wouldn’t it be nice to have just one password?  It may be possible using Single Sign On.  In this overview level session, we will discuss how the process works.  We will cover the steps to setup an IBM i in an existing Windows Environment.  Finally, the session will provide some pain points and best practices to consider before implementing Single Sign On.  Time and systems permitting, a live demo of the setup and usage will conclude the session.
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and the Team Lead for the IBM i Security and Authentication Technology Expert Labs team in Rochester, MN. He is an IBM certified Thought Leader and The Open Group certified Distinguished Technical... Read More →
Tuesday May 20, 2025 8:00am - 9:00am PDT
Room 8 1150 Magic Way, Anaheim, CA 92802

9:15am PDT

Using Function Usage to add Another Layer to your IBM i Security Defenses
Tuesday May 20, 2025 9:15am - 10:15am PDT
Come to this session to understand what Function Usage (formerly known as Application Administration) is, how to access it, how to implement settings to add an additional layer of security to your IBM i Security strategy and how discover or report on current settings. Carol will also discuss the audit journal entries that are generated by function usage and describe several ways to utilize this information.

 
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
Tuesday May 20, 2025 9:15am - 10:15am PDT
Room 8 1150 Magic Way, Anaheim, CA 92802

10:45am PDT

30 Security Tips in 60 Minutes
Tuesday May 20, 2025 10:45am - 11:45am PDT
Security is a big topic, but it doesn’t have to be overwhelming.  Just like weightlifting, where you can start with smaller weights and work your way up, such is the case in cyber security, you can reduce your risk by doing some basic things as you work toward bigger goals.  Examining the most common causes of security failures and a few simple countermeasures can help you take some action now.      
 

 
Speakers
avatar for Robert Nettgen

Robert Nettgen

Senior Consultant, Briteskies
Robert Nettgen wanted a career in radio broadcasting, but saw that profession declining and found better pay working in IT.  A PC developer in the ‘80’s, Rob started administering AS/400s in the early ‘90s for a Radio/TV group owner.  In 1999 Rob accepted a job as IT director... Read More →
Tuesday May 20, 2025 10:45am - 11:45am PDT
Room 8 1150 Magic Way, Anaheim, CA 92802

3:15pm PDT

Securing SSH on IBM i - Practical Approach
Tuesday May 20, 2025 3:15pm - 4:15pm PDT
•  SSH is the preferred shell for administering and managing OpenSource technology on the IBM i
•  Automation software such as Ansible requires SSH connectivity to function properly

• Organizations are adopting DevOps tools such as Merlin, VS Code for i, etc. to deploy application code that requires SSH connectivity

• Provide examples and tips to secure SSH  for any IBM i environment 

 
Speakers
Tuesday May 20, 2025 3:15pm - 4:15pm PDT
Room 8 1150 Magic Way, Anaheim, CA 92802

4:30pm PDT

Break Free from Defaults – Why Keeping Them Can Harm Your System Security!
Tuesday May 20, 2025 4:30pm - 4:50pm PDT
Misconfiguration is still one of the leading causes of data breaches.
IBM i settings can also be misconfigured—either by mistake or neglect.
Not updating the shipped configurations can expose your system.
Find out how you can improve the shipped configuration on your new system or improve the configuration that has been handed down year after year, hardware migration to hardware migration.

During this session, you'll learn about the top IBM i security configuration errors that can make your system, data and organization vulnerable.
 
Speakers
avatar for Amy Williams

Amy Williams

Sr Security Services Consultant, Fortra LLC
Amy Williams is a Senior Security Services Consultant who joined Fortra in 2015. She holds CISSP, CISA, and PCI-P certifications.Amy has worked on the IBM i platform for nearly 30 years and her experience includes application testing, system installation, system administration, and... Read More →
Tuesday May 20, 2025 4:30pm - 4:50pm PDT
Room 8 1150 Magic Way, Anaheim, CA 92802

5:05pm PDT

IBM i Security: A Dual Responsibility
Tuesday May 20, 2025 5:05pm - 5:25pm PDT
With security breaches making weekly headlines, what is IBM doing to provide us with a secure-able operating system? And once delivered, what are our responsibilities? Or is what IBM's doing sufficient such that we have no additional work or responsibilities? Come and join a lively discussion between Steve Will and Carol Woodbury as they debate these relevant issues.
Speakers
avatar for Steve Will

Steve Will

IBM i CTO & Chief Architect, IBM
Steve is the CTO and Chief Architect for the IBM i Operating System. Spending the past fourteen years of his IBM career in this position, he has become an award-winning speaker, author of the influential blog "You and i," (https://bit.ly/You-and-i-blog) and is one of the most sought-after voices at customer briefings and events. Steve has worked on IBM i and its predecessors since before the creation of the AS/400, and is currently responsible for setting the strategy of the IBM i operating system, as well as deciding which enhancements will be implemented. In his role, he talks to clients and pa... Read More →
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
Tuesday May 20, 2025 5:05pm - 5:25pm PDT
Room 8 1150 Magic Way, Anaheim, CA 92802
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -