POWERUp 2019 has ended
Experience the magic of education. 
Sunday, May 19 • 1:30pm - 2:30pm
15CF POWER Panel: Security

Log in to save this to your schedule and see who's attending!

Hands up everyone who has heard – or even shared - the assertion that IBM i is one of the most secure systems available. Wow, that’s virtually all of you! Unfortunately, that claim comes with a HUGE disclaimer regarding knowledge and effort that most of us prefer to ignore. Of course, security, and it’s regulatory companion, compliance, are both highly-desirable states but what does it really mean to achieve it? Does it involve the OS, your application providers, or just your perimeter firewall? IBM has been steadily adding security-related features with each new OS release but most of us still rely heavily on the simple menu system that we wrote in 1992 to protect our most critical data. It’s time that we “modernize” our approach to IBM i security in the same way we are modernizing our applications so let’s talk about what needs to be tackled when locking things down and how can we avoid breaking the good stuff in the process.

This panel is ready to dispel the myths, disclose the realities, and discuss how to keep your company out of the spotlight.

Got a question to ask during the panel? Submit Now

This is Session ID:180244

avatar for Carol Woodbury

Carol Woodbury

VP Global Security Services, HelpSystems
Carol Woodbury is Vice President of Global Security Services at HelpSystems.  Prior to joining HelpSystems, Carol was the co-founder and Vice President of SkyView Partners, a firm that specialized in security services and software for IBM i, AIX and Linux. Carol is an award-winning... Read More →

avatar for Shmuel Zailer

Shmuel Zailer

Chief Executive & Technology Officer, Raz-Lee Security, Inc.
Shmuel founded Raz-Lee Security 35 years ago. He has been working with IBM i since its release to the market. Prior to that, he worked with S/38, the predecessor of the AS/400. He is a renowned expert in IBM i technology with a passion for developing software that is user-friendly... Read More →
avatar for Steve Pitcher

Steve Pitcher

IBM i Administration, iTech Solutions
Multi-industry IT professional with experience as a developer, systems administrator and IT Director.Skilled in security and collaborative solutions with a focus on IBM i (AS/400 or iSeries). 
avatar for Robin Tatam

Robin Tatam

Director of Security Technologies, Helpsystems
Robin Tatam is HelpSystems’ Global Director of Security Technologies and a COMMON subject matter expert (SME). As an award-winning speaker on security topics, Robin has been interviewed and quoted by industry magazines and has published numerous trade articles. Robin’s extensive... Read More →
avatar for Thom Haze

Thom Haze

IBM i Operating System Security Development, IBM
Thom is the lead software developer for Digital Certificate Manager (DCM) and provides cryptography related enhancements to IBM i. He has been working on IBM i and earlier named platforms since 1989 on various projects such as Integrated Windows, Linux, and VMware Servers, Integrated... Read More →
avatar for Jeffrey Uehling

Jeffrey Uehling

Syncsort Security Expert, Syncsort
Jeff Uehling has over 30 years of experience working in security technology for the IBM i, and its predecessor systems, and is an expert in the Syncsort’s security offerings. Jeff’s IBM experience includes working in the IBM i OS development group, specifically as lead architect... Read More →

Sunday May 19, 2019 1:30pm - 2:30pm
Fantasy Tower Monorail A-B

Twitter Feed