POWERUp 2019 has ended
Experience the magic of education. 
Back To Schedule
Sunday, May 19 • 1:30pm - 2:30pm
15CF POWER Panel: Security

Log in to save this to your schedule, view media, leave feedback and see who's attending!

Hands up everyone who has heard – or even shared - the assertion that IBM i is one of the most secure systems available. Wow, that’s virtually all of you! Unfortunately, that claim comes with a HUGE disclaimer regarding knowledge and effort that most of us prefer to ignore. Of course, security, and it’s regulatory companion, compliance, are both highly-desirable states but what does it really mean to achieve it? Does it involve the OS, your application providers, or just your perimeter firewall? IBM has been steadily adding security-related features with each new OS release but most of us still rely heavily on the simple menu system that we wrote in 1992 to protect our most critical data. It’s time that we “modernize” our approach to IBM i security in the same way we are modernizing our applications so let’s talk about what needs to be tackled when locking things down and how can we avoid breaking the good stuff in the process.

This panel is ready to dispel the myths, disclose the realities, and discuss how to keep your company out of the spotlight.

Got a question to ask during the panel? Submit Now

This is Session ID:180244

avatar for Carol Woodbury

Carol Woodbury

President and CTO, DXR Security

avatar for Shmuel Zailer

Shmuel Zailer

Chief Executive & Technology Officer, Raz-Lee Security, Inc.
Shmuel founded Raz-Lee Security 35 years ago. He has been working with IBM i since its release to the market. Prior to that, he worked with S/38, the predecessor of the AS/400. He is a renowned expert in IBM i technology with a passion for developing software that is user-friendly... Read More →
avatar for Steve Pitcher

Steve Pitcher

IBM i Administration, iTech Solutions
Steve Pitcher is a Solutions Expert on Systems Administration and Security with iTech Solutions Group and an Industry Analyst at MC Press Online. He’s been a specialist in IBM i solutions since 2000 with an emphasis on modernization, security and collaboration products. Steve has... Read More →
avatar for Robin Tatam

Robin Tatam

Director of Security Technologies, Helpsystems
Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive... Read More →
avatar for Thomas Haze

Thomas Haze

IBM i Operating System Security Development, IBM
Thom is the lead software developer for Digital Certificate Manager (DCM) and provides cryptography related enhancements to IBM i. He has been working on IBM i and earlier named platforms since 1989 on various projects such as Integrated Windows, Linux, and VMware Servers, Integrated... Read More →
avatar for Jeff Uehling

Jeff Uehling

IBM i Security Expert
Jeff Uehling is an independent consultant specializing in IBM i security. Prior to retiring from Syncsort, he worked for over 30 years at IBM where he served as lead architect for IBM i security technology. Jeff’s previous responsibilities at IBM included architecture, design and... Read More →

Sunday May 19, 2019 1:30pm - 2:30pm PDT
Fantasy Tower Monorail A-B