Loading…

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Security or Compliance [clear filter]
Monday, June 18
 

11:00

IBM i Latest & Greatest 7.3, 7.2 & TRs
Come hear an overview of the capabilities of the currently available releases of IBM i. From major enhancements to Db2 to major security enhancements; from key advances in open source to new storage options; from performance analysis to being able to answer business questions with integrated SQL analytics, the most recent releases and Technology Refreshes have tremendous integrated power. This is a double-length session.

Speakers
avatar for Steve Will

Steve Will

Chief Architect - IBM i, IBM
Steve has worked on the IBM i operating system and its predecessors since the initial development of the AS/400. Since 2007, he has been the IBM i Chief Architect, responsible for the strategy of the operating system and the plan for future releases.


Monday June 18, 2018 11:00 - 12:00
Promenada

11:00

Is your DATA Secure? Better make sure with RCAC!
Is your data really secure? Object level security would be one thing, if implemented. user exits are providing locks at command levels, but not at the object level Do you really want to prevent access or at least mask personal identifiable information? This session will cover the 7.2 Row and Column Level Access Control and a solution that can help you monitor over 1000 security attributes with simple dashboards and drill downs to pinpoint exposures.

Speakers
avatar for Doug Mack

Doug Mack

Consultant LAB Services, IBM
Doug Mack is a DB2 for i Analytics Consultant in IBM’s Power Systems Lab Services organization, employed by IBM in the United States. Doug currently leads the Analytics team for the DB2 for i Lab Services team delivering Query/400 modernization, DB2 Web Query, Data Warehouse design... Read More →


Monday June 18, 2018 11:00 - 12:00
Gerbera A+B

13:00

Getting up to speed with the latest IBM i Single Sign-on support
The IBM i single sign-on (SSO) support has been around for many years. More and more companies leverage the SSO support to provide more convenience to users, but also to lower administration cost and improve security. This session provides a complete introduction to what SSO exactly means and what technologies it entails when implementing it in an IBM i environment. You will also learn what IBM i services support SSO.

Speakers
avatar for Thomas Barlen

Thomas Barlen

Senior Managing Consultant at IBM - IBM i and AIX Security, IBM
IT consultant architecting and implementing security solutions mainly in the IBM i and AIX area. I am alsoa frequent speaker at technical conferences. Specialties: Cryptography, Single Signon, Securityassessments, Access Control concepts and implementation, IBM i networking, LDAP... Read More →


Monday June 18, 2018 13:00 - 14:00
Gerbera A+B

15:45

System integrity monitoring techniques - Make your auditor happy
Have you ever heard about difficulties after the systems switch ?Have you ever had to confirm your auditors that your system is secure ?Would you like to know what has really changed during your applications' upgrade ?Do you think it's important to know how your system in changing in time ?

Speakers
avatar for Rafal Jablonski

Rafal Jablonski

Founder CEO, DeLab
Founder of the DeLab company building a specialized midware applications.Rafal has begun his app-dev adventure in 80’s enchanted with processors of the time.He has been working for telcom as well as financial institutions. Former IBMer supporting IBM i clients, universities and... Read More →


Monday June 18, 2018 15:45 - 16:45
Gerbera A+B

17:00

Meeting regulatory compliance: IBM i TLS/SSL network encryption implementation and best practices
A weakness of many IP-based network services is the fact that sensitive data, such as a user's password, is transmitted in clear text over the network. IBM i provides support for Secure Sockets Layer (SSL) / Transport Layer Security (TLS) for all basic network services. Several regulations already require transmission of sensitive data to be encrypted, yet most companies do not comply with these requirements and send their confidential data in clear over the network. This session introduces the basic requirements, shows you how to set up the required environment (i.e. DCM), and gives you information about rolling out the necessary configuration changes to your client workstations.

Speakers
avatar for Thomas Barlen

Thomas Barlen

Senior Managing Consultant at IBM - IBM i and AIX Security, IBM
IT consultant architecting and implementing security solutions mainly in the IBM i and AIX area. I am alsoa frequent speaker at technical conferences. Specialties: Cryptography, Single Signon, Securityassessments, Access Control concepts and implementation, IBM i networking, LDAP... Read More →


Monday June 18, 2018 17:00 - 18:00
Gerbera A+B
 
Tuesday, June 19
 

10:30

Single Sign-on Implementation Best Practices
"This session assumes that you already know the basics of the IBM i single sign-on support. While the IBM Knowledge Base and several publications always describe the basic setup of SSO, the listed configurations do not meet best practices and are missing several important aspects, such as availability and management security. In this session, I will show based on a few typical environments how to plan and perform the SSO deployment to a mass of workstations and how to automate typical administration tasks. In addition, the session also discusses implementation considerations in an environment with several IBM i partitions/systems.Recommended prerequisite session: Getting up to speed with the latest IBM i Single Sign-on support"

Speakers
avatar for Thomas Barlen

Thomas Barlen

Senior Managing Consultant at IBM - IBM i and AIX Security, IBM
IT consultant architecting and implementing security solutions mainly in the IBM i and AIX area. I am alsoa frequent speaker at technical conferences. Specialties: Cryptography, Single Signon, Securityassessments, Access Control concepts and implementation, IBM i networking, LDAP... Read More →


Tuesday June 19, 2018 10:30 - 11:30
Gerbera A+B
 
Wednesday, June 20
 

08:00

Authority Collection on IBM i 7.3
A shiny security gem was added to the IBM i operating system in IBM i 7.3, known as Authority Collection.This patented support is built into IBM i and can be leveraged by IBM i clients to do the following:1. Identify excess authority in such a manner that access to data can be reduced without the fear of breaking applications. Benefit to you"¦ Reducing excess authority == Reduced Risk2. Enable solution providers with a precise approach for understanding the source of authorization failures.Benefit to you"¦ Productivity boost3. Train your IBM i Security team. Don"t guess and don"t struggle. Use this technology to learn how to deploy security on IBM i.Benefit to you"¦ Improved Security knowledge and deployment

Speakers
avatar for Scott Forstie

Scott Forstie

Db2 for i Business Architect, IBM
Scott Forstie is a Senior Technical Staff Member within IBM i development and spends most of his time working as the Db2 for i Business Architect. He has worked on IBM operating system development since joining IBM in 1989.Scott is a frequently published author, speaker at industry... Read More →


Wednesday June 20, 2018 08:00 - 09:00
Orchidea B