Loading…
Unlock the Power of IBM i at POWERUp 2025!

Join us in Disneyland, California, for POWERUp 2025, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Wednesday May 21, 2025 3:45pm - 4:45pm PDT
Embark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don't miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development!

In this session tailored for ILE developers (including RPG and CL developers), we'll dissect real-world examples of security pitfalls in our sample software, exploring issues like object authority, adopted authority, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild.

Learning Objectives:
1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.
2. Understand the basics of creating more secure software on IBM i.
Speakers
avatar for Brian Nordland

Brian Nordland

Director of Development, Fortra
Brian Nordland is the Director of Development for IBM Power Development at Fortra. Brian has been a prominent speaker at events, webinars, and user groups, including COMMON and LUG for over a decade. He is a co-inventor on multiple patents and has authored technical publications in... Read More →
Wednesday May 21, 2025 3:45pm - 4:45pm PDT
Adventure Tower, Safari 1150 Magic Way, Anaheim, CA 92802

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Share Modal

Share this link via

Or copy link