Loading…
Unlock the Power of IBM i at POWERUp 2025!

Join us in Disneyland, California, for POWERUp 2025, the premier conference for IBM i professionals. Whether you’re an experienced expert or just starting your IBM i journey, this event offers unparalleled education, hands-on workshops, and valuable networking opportunities. Stay ahead of the curve with insights from industry leaders, explore the latest innovations, and connect with a thriving community that shares your passion for IBM i. Don’t miss this opportunity to expand your knowledge, grow your skills, and power up your career!

Venue: Adventure clear filter
Monday, May 19
 

10:00am PDT

IBM i Security Basics
Monday May 19, 2025 10:00am - 11:00am PDT
This is an "IBM i Security 101" session.  We will cover IBM i security topics from the basics (user profiles, system values, and object authority) through more advanced topics (adopted authority, authority checking, IFS considerations, audit journaling, and a multi-layer defensive posture).  We'll cover some of these topics from the traditional "greenscreen" as well as Navigator for i.
Speakers
avatar for Steve Riedmueller

Steve Riedmueller

Certified IBM i Admin - IBM Champion, Speaker, Mentor, and Advocate, Kisco
Monday May 19, 2025 10:00am - 11:00am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

11:15am PDT

IBM i Security – What's New in IBM i 7.6
Monday May 19, 2025 11:15am - 12:15pm PDT
Come learn about the security features included in the latest operating system release IBM i 7.6. Whether exciting, mundane, or even a little scary to consider, there is something that will pique your interest.
Speakers
avatar for Tim Mullenbach

Tim Mullenbach

IBM i Security Business Architect, IBM
Tim Mullenbach is a Senior Software Engineer at IBM Rochester.  He spent his first 20+ IBM years with the IBM i Sockets and System TLS development team prior to transitioning to the IBM i Security Business Architect role in 2018.  
Monday May 19, 2025 11:15am - 12:15pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

3:15pm PDT

Ransomware and IBM i: Strategies to Protect the IFS from Cyber Attacks
Monday May 19, 2025 3:15pm - 4:15pm PDT
Critical business assets stored in IBM i IFS objects are as vulnerable to ransomware and other cyberthreats as files stored on Windows and Linux servers. Ransomware gangs pose a significant threat to systems including the IBM i. These criminal organizations are becoming more sophisticated with creation and distribution of harmful programs. Securing the IBM i from potential attacks is a key element within the IT Defense in Depth strategy.  
 
Speakers
Monday May 19, 2025 3:15pm - 4:15pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

4:30pm PDT

SIEM-plify your IBM i Security Strategy
Monday May 19, 2025 4:30pm - 4:50pm PDT
The IBM i runs the core applications for so many businesses, yet it is the least visible to most security teams. Increasing integration into adjacent technologies, combined with the severity of today’s threats, makes detecting suspicious activity quickly more important than ever. It is critical to have your IBM i security events included in your security information event management (SIEM) console, MDR or XDR solutions.
But what does that mean for the IBM i? And where do you start?
 
Speakers
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer, Fortra LLC
Sandi has been working with Fortra customers for over 20 years supporting systems monitoring and security software. With experience on IBM i, AIX, and Linux, she has been involved in product demonstrations, implementation, support, training, research, and product testing. Sandi is... Read More →
Monday May 19, 2025 4:30pm - 4:50pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

5:05pm PDT

Ensuring Data Resiliency
Monday May 19, 2025 5:05pm - 5:25pm PDT
Data resiliency is critical in today’s cyber threat landscape. Many companies believe that their high availability solution or disaster recovery plan is sufficient in the event of a cyber-attack; however, that’s not enough. Recovering from a cyber event requires companies to implement data security and protection measures beyond the standard disaster recovery plan.
 
Speakers
Monday May 19, 2025 5:05pm - 5:25pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802
 
Tuesday, May 20
 

8:00am PDT

Single Sign On (Kerberos) Overview for IBM i
Tuesday May 20, 2025 8:00am - 9:00am PDT
Wouldn’t it be nice to have just one password?  It may be possible using Single Sign On.  In this overview level session, we will discuss how the process works.  We will cover the steps to setup an IBM i in an existing Windows Environment.  Finally, the session will provide some pain points and best practices to consider before implementing Single Sign On.  Time and systems permitting, a live demo of the setup and usage will conclude the session.
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security and Authentication Technology Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert... Read More →
Tuesday May 20, 2025 8:00am - 9:00am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

9:15am PDT

Using Function Usage to add Another Layer to your IBM i Security Defenses
Tuesday May 20, 2025 9:15am - 10:15am PDT
Come to this session to understand what Function Usage (formerly known as Application Administration) is, how to access it, how to implement settings to add an additional layer of security to your IBM i Security strategy and how discover or report on current settings. Carol will also discuss the audit journal entries that are generated by function usage and describe several ways to utilize this information.

 
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
Tuesday May 20, 2025 9:15am - 10:15am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

10:45am PDT

30 Security Tips in 60 Minutes
Tuesday May 20, 2025 10:45am - 11:45am PDT
Security is a big topic, but it doesn’t have to be overwhelming.  Just like weightlifting, where you can start with smaller weights and work your way up, such is the case in cyber security, you can reduce your risk by doing some basic things as you work toward bigger goals.  Examining the most common causes of security failures and a few simple countermeasures can help you take some action now.      
 

 
Speakers
avatar for Robert Nettgen

Robert Nettgen

Senior Consultant, Briteskies
Robert Nettgen wanted a career in radio broadcasting, but saw that profession declining and found better pay working in IT.  A PC developer in the ‘80’s, Rob started administering AS/400s in the early ‘90s for a Radio/TV group owner.  In 1999 Rob accepted a job as IT director... Read More →
Tuesday May 20, 2025 10:45am - 11:45am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

3:15pm PDT

An Introduction to Cyber Security Frameworks
Tuesday May 20, 2025 3:15pm - 4:15pm PDT
Within the realm of “improving security” is a concept called “risk management.”  Within that realm, there are collections of rules, standards, recommendations, requirements and guidelines called “Security Frameworks.”

Cyber security is a lot more than just putting in a firewall, checking a few settings on IBM i, and reminding your coworkers to stop putting passwords on post-it notes pasted to their monitors.

Dive into a foundation of cyber security, best practices, what you should be doing and what you must be doing

Learning Objectives:
  • Get a list of the top policies and procedures for establishing and maintaining security controls across your network.
  • Learn how to implement and maintain compliance procedures across your organization
  • Ideas for gaining “buy in” from those outside the Information Security team and how to convey the importance of information security and compliance.
Speakers
avatar for Robert Nettgen

Robert Nettgen

Senior Consultant, Briteskies
Robert Nettgen wanted a career in radio broadcasting, but saw that profession declining and found better pay working in IT.  A PC developer in the ‘80’s, Rob started administering AS/400s in the early ‘90s for a Radio/TV group owner.  In 1999 Rob accepted a job as IT director... Read More →
Tuesday May 20, 2025 3:15pm - 4:15pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

4:30pm PDT

Break Free from Defaults – Why Keeping Them Can Harm Your System Security!
Tuesday May 20, 2025 4:30pm - 4:50pm PDT
Misconfiguration is still one of the leading causes of data breaches.
IBM i settings can also be misconfigured—either by mistake or neglect.
Not updating the shipped configurations can expose your system.
Find out how you can improve the shipped configuration on your new system or improve the configuration that has been handed down year after year, hardware migration to hardware migration.

During this session, you'll learn about the top IBM i security configuration errors that can make your system, data and organization vulnerable.
 
Speakers
avatar for Amy Williams

Amy Williams

Principal Security Services Consultant, Fortra LLC
Amy Williams is a Senior Security Services Consultant who joined Fortra in 2015. She holds CISSP, CISA, and PCI-P certifications.Amy has worked on the IBM i platform for nearly 30 years and her experience includes application testing, system installation, system administration, and... Read More →
Tuesday May 20, 2025 4:30pm - 4:50pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

5:05pm PDT

IBM i Security: A Dual Responsibility
Tuesday May 20, 2025 5:05pm - 5:25pm PDT
With security breaches making weekly headlines, what is IBM doing to provide us with a secure-able operating system? And once delivered, what are our responsibilities? Or is what IBM's doing sufficient such that we have no additional work or responsibilities? Come and join a lively discussion between Steve Will and Carol Woodbury as they debate these relevant issues.
Speakers
avatar for Steve Will

Steve Will

IBM i CTO & Chief Architect, IBM
Steve is the CTO and Chief Architect for the IBM i Operating System. Spending the past fourteen years of his IBM career in this position, he has become an award-winning speaker, author of the influential blog "You and i," (https://bit.ly/You-and-i-blog) and is one of the most sought-after voices at customer briefings and events. Steve has worked on IBM i and its predecessors since before the creation of the AS/400, and is currently responsible for setting the strategy of the IBM i operating system, as well as deciding which enhancements will be implemented. In his role, he talks to clients and pa... Read More →
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
Tuesday May 20, 2025 5:05pm - 5:25pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802
 
Wednesday, May 21
 

8:00am PDT

Best Practices for the IBM i Security Administrator
Wednesday May 21, 2025 8:00am - 9:00am PDT
Know you should be managing your IBM i Security implementation but don’t know where to start or what all needs to be checked? This session will provide you with a checklist of the areas of the operating system that should be checked on a regular basis. Carol and Steve will explain why it’s important to perform these checks along with the risks of not maintaining your security configuration. The Run SQL Script file used during the demo will be provided with the handouts.
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
avatar for Steve Riedmueller

Steve Riedmueller

Certified IBM i Admin - IBM Champion, Speaker, Mentor, and Advocate, Kisco
Wednesday May 21, 2025 8:00am - 9:00am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

9:15am PDT

A Live Demo of Navigator for i
Wednesday May 21, 2025 9:15am - 10:15am PDT
IBM Navigator for i is constantly being improved with new features and updates to functions that have been there since the beginning. Come explore what Navigator for i has to offer via live demo.
Speakers
avatar for Tim Rowe

Tim Rowe

STSM - IBM i Business Architect, IBM
Tim Rowe is the Business Architect responsible for Application Development and Systems Management for the IBM i operating system. His responsibilities include helping to make sure that the IBM i has what is needed to be successful both today and into the future. He sends much of his... Read More →
avatar for Ann Wilkerson

Ann Wilkerson

Software Developer, IBM
Ann Wilkerson is a lead user interface developer in IBM i. She joined the Rochester lab in 2021 and has since worked on Navigator, IBM i Services, and IBM i Migrate While Active. Her focus areas include security, networking, and the IFS.
Wednesday May 21, 2025 9:15am - 10:15am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

10:45am PDT

Building a Successful IFS Security Strategy
Wednesday May 21, 2025 10:45am - 11:45am PDT
Ask any security professional which area of IBM i security is most often ignored and chances are the unanimous response is a chorus of “the Integrated File System."

Many organizations are either unaware of the risks that an unsecured IFS poses or are simply unsure of how to secure it. Regardless of the reason, this is a problem. The system interface doesn’t differentiate how a user profile accesses data – which leaves sensitive data exposed and vulnerable to manipulation, malware, and even theft.
Speakers
avatar for Sandi Moore

Sandi Moore

Sr. Solutions Engineer, Fortra LLC
Sandi has been working with Fortra customers for over 20 years supporting systems monitoring and security software. With experience on IBM i, AIX, and Linux, she has been involved in product demonstrations, implementation, support, training, research, and product testing. Sandi is... Read More →
Wednesday May 21, 2025 10:45am - 11:45am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

3:45pm PDT

Audit Journaling with Navigator for i
Wednesday May 21, 2025 3:45pm - 4:45pm PDT
In this session, we will explore how Navigator for i makes audit journaling on the IBM i a breeze! Navigator simplifies configuring auditing to just a few button clicks. Once you are set up, Navigator makes consuming and analyzing audit journal entries simple. We will also take a look at new improvements that increase the performance of analyzing audit entries and open up the possibilities of what you can do with your auditing data.
Speakers
avatar for Ann Wilkerson

Ann Wilkerson

Software Developer, IBM
Ann Wilkerson is a lead user interface developer in IBM i. She joined the Rochester lab in 2021 and has since worked on Navigator, IBM i Services, and IBM i Migrate While Active. Her focus areas include security, networking, and the IFS.
Wednesday May 21, 2025 3:45pm - 4:45pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

5:00pm PDT

IBM i Security with an SQL Chaser - Round 3
Wednesday May 21, 2025 5:00pm - 6:00pm PDT
In this award-winning session, be prepared to hear Scott Forstie and Carol Woodbury shake up the world of IBM i Security, mixing up yet another set of SQL concoctions to bedazzle the otherwise boring world of IBM i Security. This menu includes examples of using SQL to find vulnerabilities in your code (aka penetration testing) as well as new (but practical!) ways to use SQL services to discover and fix your security out your current processes that have reached their ‘consume by’ date. And, of course, be prepared to be a bit shaken (but not stirred).
 
Speakers
avatar for Carol Woodbury

Carol Woodbury

IBM i Security SME and Senior Advisor, Kisco Systems
With over 30 years' experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. During her career, Carol has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate... Read More →
avatar for Scott Forstie

Scott Forstie

STSM, Db2 for i Architect, IBM
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Architect. He has worked on IBM operating system development since joining IBM in 1989.Scott is a frequently published author, speaker at industry events... Read More →
Wednesday May 21, 2025 5:00pm - 6:00pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802
 
Thursday, May 22
 

8:00am PDT

IBM i Security Best Practices
Thursday May 22, 2025 8:00am - 10:15am PDT
While the IBM i is an extremely secure system, there are still a variety of attack vectors that can result from administrative mistakes that can cause a breach.  In this session, we will review many of the common issues and configuration errors we have seen time and again with our IBM i customers.  If you are a system administrator or security officer, this session is a must attend!
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security and Authentication Technology Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert... Read More →
Thursday May 22, 2025 8:00am - 10:15am PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

11:15am PDT

TLS for ACS and Navigator
Thursday May 22, 2025 11:15am - 12:15pm PDT
The use of encrypted sessions is both an effective way to prevent credential theft, as well as a requirement for numerous laws and regulations.
In this session, you will see how to configure the replacement for Client Access—Access Client Solutions—to use an encrypted (TLS) session.
This session will include an example of using your IBM i as a CA (Certificate Authority). You’ll also see an example of creating a request to send to a well-known CA to create the digital certificate you’ll need to assign to the servers to enable encrypted communications.
Demonstration of securing Navigator for i using a self-signed certificate.
 
Speakers
avatar for Amy Williams

Amy Williams

Principal Security Services Consultant, Fortra LLC
Amy Williams is a Senior Security Services Consultant who joined Fortra in 2015. She holds CISSP, CISA, and PCI-P certifications.Amy has worked on the IBM i platform for nearly 30 years and her experience includes application testing, system installation, system administration, and... Read More →
Thursday May 22, 2025 11:15am - 12:15pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

1:30pm PDT

Disk-level encryption isn’t enough
Thursday May 22, 2025 1:30pm - 2:30pm PDT
As companies look to leverage encryption as part of their security landscape, it can be tempting to just implement disk-level encryption. As security requirements continue to grow and compliance regulations are taken into account for the IBM i environment, administrators are finding they need to implement encryption at the field level versus disk level encryption.
Speakers
Thursday May 22, 2025 1:30pm - 2:30pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

3:30pm PDT

Moving to a Higher Level: Password Resilience
Thursday May 22, 2025 3:30pm - 4:30pm PDT
Have you thought about the passwords you use on your systems?  What rules or restrictions do you have in place?  But more importantly, why?!  Have you ever thought about what those rules actually do to your passwords?  Do you think they are making you more secure or less secure?  In this presentation, we will cover passwords in depth, in theory, and specific to IBM i.  Can your IBM i password be hacked?  Come and find out at this inquisitive session!  COMMON Bronze medal session.
Speakers
avatar for Robert Andrews

Robert Andrews

Principal Security Consultant, IBM
Robert Andrews is a Principal Security Consultant, Senior Technical Staff Member (STSM), and Team Lead for the IBM i Security and Authentication Technology Expert Labs team in Rochester, MN. An IBM Certified Thought Leader and The Open Group Distinguished Technical Specialist, Robert... Read More →
Thursday May 22, 2025 3:30pm - 4:30pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802

4:45pm PDT

Real-Time Access to Integrated File System Data Across the Network
Thursday May 22, 2025 4:45pm - 5:45pm PDT
The “green screen” isn’t the only place where users can interact with IBM i file system data. Explore the various file systems that allow users to remotely access the system to get more done with less effort. Latest updates to the various file systems will be included.

Learning Objectives:
  1.     Understand the file sharing options on the IBM i and their differences.
  2.     Understand how to set up/use the file sharing options on the IBM i.
  3.     Understand how policy and configuration settings can affect various servers.


Speakers
avatar for Justin Nelson

Justin Nelson

Staff Software Engineer, IBM
I work on the integrated file system for the IBM i (aka AS400).
Thursday May 22, 2025 4:45pm - 5:45pm PDT
Adventure 1150 Magic Way, Anaheim, CA 92802
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.