Loading…
Security [clear filter]
Tuesday, September 10
 

8:00am EDT

21AG POWER Pick: IBM i Security Best Practices
This presentation will cover the best practices necessary to secure your IBM i server. Topics include why you need to run at security level 50, including examples of security exposures that exist at the lower security levels, how to detect and prevent programs that could compromise security on your system, necessary system value settings, security recommendations when developing applications, and more. If you are a system administrator or system security officer, this session is a must for you to attend.

Learning Objectives:

Speakers
avatar for Jeff Uehling

Jeff Uehling

IBM i Security Expert
Jeff Uehling is an independent consultant specializing in IBM i security. Prior to retiring from Syncsort, he worked for over 30 years at IBM where he served as lead architect for IBM i security technology. Jeff’s previous responsibilities at IBM included architecture, design and... Read More →



Tuesday September 10, 2019 8:00am - 10:15am EDT
Regency EF 109 South Capitol Avenue Indianapolis, IN 46204
  Security

10:30am EDT

23AB Application Security Basics
Application Security is more important than ever, but as enterprise architectures grow in size and complexity it continues to increase in relevance, making process and standards more important than ever. John Saboe got his start in application security from a developer perspective and has continued to be an advocate for building architectures the right way – including security concerns from the start – throughout his career. John will cover application security basics, demystifying some of the common terminology and standards, and introduce resources for further learning. He will also discuss examples from his own experiences as an application security consultant, as a developer, supporting architectures, and designing new architectures with security in mind.

Learning Objectives:

Speakers
avatar for Justin Reock

Justin Reock

Chief Architect, OpenLogic by Perforce
Justin has over 20 years’ experience working in various software roles and is an outspoken free software evangelist, delivering enterprise solutions and community education on databases, integration work, architecture, and technical leadership. He is currently the Chief Architect... Read More →



Tuesday September 10, 2019 10:30am - 11:30am EDT
Network 109 South Capitol Avenue Indianapolis, IN 46204
  Security

1:30pm EDT

25AG What’s New in 7.2, 7.3 and 7.4 Security
This presentation will cover the extensive list of security enhancements added by IBM in the 7.2, 7.3 and 7.4 operating system releases. The 7.2 enhancement called Row and Column Access Control (RCAC) will be discussed including an example designed to get you started with RCAC. The 7.3 security changes include the major security enhancement called Authority Collection plus exciting new support to Audit Network Communication sessions into and out of your IBM i Server. The 7.4 security changes including new support called Object Level Authority Collection, New security support for the DB2 Mirror enhancement in 7.4, SST User Management changes plus Networking security changes.

Learning Objectives:

Speakers
avatar for Jeff Uehling

Jeff Uehling

IBM i Security Expert
Jeff Uehling is an independent consultant specializing in IBM i security. Prior to retiring from Syncsort, he worked for over 30 years at IBM where he served as lead architect for IBM i security technology. Jeff’s previous responsibilities at IBM included architecture, design and... Read More →



Tuesday September 10, 2019 1:30pm - 2:30pm EDT
Regency EF 109 South Capitol Avenue Indianapolis, IN 46204
  Security

5:15pm EDT

28AG IBM i Encryption Made Easy
Do you need to encrypt sensitive data on your IBM i, such as confidential employee information, personal credit information or personal health information, but worry about the complexity of implementing encryption? In this session, Jeff Uehling, Security Expert at Syncsort, well-known expert in cryptography and key management, put your encryption fears to rest. You’ll learn how IBM i Field Procedures (FieldProcs), introduced in V7R1, have greatly simplified encryption projects, often eliminating the need for application changes.

Learning Objectives:
• How to easily encrypt data without impacting applications using FieldProc
• Challenges and practical considerations for FieldProc encryption
• The importance of encryption key management to meet compliance requirements

Speakers
avatar for Jeff Uehling

Jeff Uehling

IBM i Security Expert
Jeff Uehling is an independent consultant specializing in IBM i security. Prior to retiring from Syncsort, he worked for over 30 years at IBM where he served as lead architect for IBM i security technology. Jeff’s previous responsibilities at IBM included architecture, design and... Read More →



Tuesday September 10, 2019 5:15pm - 6:15pm EDT
Regency EF 109 South Capitol Avenue Indianapolis, IN 46204
  Security
 
Wednesday, September 11
 

8:00am EDT

31AE Controlling Access to IBMi Systems and Data
To protect your critical data from access by unauthorized users or intruders, and to comply with increasingly strict IT security regulations, you must take control of all access points to your IBM i server. Attend this session for an in-depth discussion of all the points of access that must be managed and how they can be secured using IBM i exit points.

Learning Objectives:
• Securing network access and communication ports
• How database access via open-source protocols can be secured
• Taking control of command execution

Speakers
avatar for Jeff Uehling

Jeff Uehling

IBM i Security Expert
Jeff Uehling is an independent consultant specializing in IBM i security. Prior to retiring from Syncsort, he worked for over 30 years at IBM where he served as lead architect for IBM i security technology. Jeff’s previous responsibilities at IBM included architecture, design and... Read More →



Wednesday September 11, 2019 8:00am - 9:00am EDT
Regency C 109 South Capitol Avenue Indianapolis, IN 46204
  Security

10:30am EDT

33AG Authority Collection in 7.3 & 7.4: Locking Down Security for Sensitive Data, Files and Objects
This presentation will introduce a new capability in the 7.3 release called Authority Collection and also cover the exciting changes in the 7.4 release. Authority collection is new support designed to assist the security administrator and application provider in locking down object level security. This support will help ensure that object authority is set to the most secure value while still allowing an application to run successfully. This presentation is a must see for security administrators and application developers.

Learning Objectives:

Speakers
avatar for Jeff Uehling

Jeff Uehling

IBM i Security Expert
Jeff Uehling is an independent consultant specializing in IBM i security. Prior to retiring from Syncsort, he worked for over 30 years at IBM where he served as lead architect for IBM i security technology. Jeff’s previous responsibilities at IBM included architecture, design and... Read More →



Wednesday September 11, 2019 10:30am - 11:30am EDT
Regency EF 109 South Capitol Avenue Indianapolis, IN 46204
  Security
 
Filter sessions
Apply filters to sessions.