Loading…
WMCPA iCON2025
or to bookmark your favorites and sync them to your phone or calendar.
Type: Security clear filter
Wednesday, March 12
 

8:30am PDT

OAuth: What It Is, How It Works, and Why You Should Use It
Wednesday March 12, 2025 8:30am - 9:45am PDT
Web security

API Flows and Grant types

PKCE

JWT Access Tokens

Encryption/Signatures

Scopes and OpenID Connect
Speakers
Wednesday March 12, 2025 8:30am - 9:45am PDT
Milwaukee

3:45pm PDT

AI and Security: Oil and Water, or a Match Made in Heaven?
Wednesday March 12, 2025 3:45pm - 5:00pm PDT
Is artificial intelligence good for security or a menace? During this session Carol will explore the security and privacy considerations you’ll want to make when considering the implementation of AI. She’ll also discuss the ways that AI is used in the security industry as well as the ways bad actors are exploiting it. Finally, she’ll discuss the current laws and regulations surrounding AI.
Speakers
Wednesday March 12, 2025 3:45pm - 5:00pm PDT
Geneva 2
 
Thursday, March 13
 

8:30am PDT

Web Server Magic on IBM i
Thursday March 13, 2025 8:30am - 9:45am PDT
Anyone creating web or mobile applications, or APIs, can benefit from the techniques shown here:

Do I need a web server? Which one is best for me?
Securing your site
Apache and Nginx tips and tricks
HTTPS encryption (SSL/TLS), including using the free Let’s Encrypt
Create user-friendly and search-engine friendly URLs over any web application
What if you become popular? (performance and handling a large number requests)
Learning Objectives
Understand how to secure the Apache web server on IBM i
Learn to use Apache’s most useful features, including search engine optimization, logging, and virtual hosts
Audience
Administrators and developers seeking to prepare their systems for web applications, improve performance, and improve security.
Speakers
Thursday March 13, 2025 8:30am - 9:45am PDT
Geneva 2

10:15am PDT

Deconstructing an IBM i Penetration Test
Thursday March 13, 2025 10:15am - 11:30am PDT
  • Ever wonder why your penetration tests never yield a failure on IBM i? It's because security generalists don't know how to test it properly. Steve has successfully breached many systems in less than five minutes and will show you how to stop him.
  • Worse Practices in System Security: This session will explore the bad, ugly and ugliest of IBM i security misconfigurations so you can learn from others’ misfortunes.
Speakers
avatar for Steve Pitcher

Steve Pitcher

Account Executive and Security Engineer, Service Express
Steve has been involved with IBM i since 2001 primarily in the manufacturing and distribution industries. Over that period he’s been a systems administrator, developer, IT Manager and IT Director. He joined iTech Solutions in 2017 in a combined sales/technical role, bringing additional... Read More →
Thursday March 13, 2025 10:15am - 11:30am PDT
Courtyard 2

2:15pm PDT

Inject More Stability Into DB2 for i
Thursday March 13, 2025 2:15pm - 3:30pm PDT
In this new session, Scott will explore the many ways that “bad actors” can attempt to subvert the security on IBM i. Whether the topic is protecting against SQL Injection, closing doors to acquiring elevated privileges, or attempting to discover unprotected objects, this session will include techniques for evaluation and protection of your IBM i. Attend this session to take a big step towards discovering and eliminating attack vectors within Db2 for i!
Speakers
Thursday March 13, 2025 2:15pm - 3:30pm PDT
Geneva 2

3:45pm PDT

The Best of IBM i Security and What's New
Thursday March 13, 2025 3:45pm - 5:00pm PDT
IBM has provided so many security features with IBM i, it’s hard to keep track of them much less understand all of the new features. This session highlights Carol and Steve’s favorite IBM i Security features and details the security features in recent Technology Refreshes that you may have missed.
Speakers
Thursday March 13, 2025 3:45pm - 5:00pm PDT
Courtyard 3
 
Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.