Rocket Software : Multiplatform Secure, Seamless Data Replication
Presenter: Andrew Simpson – Solutions Architect Rocket Software.
Your IBM i is the strategic platform of choice for your organisation, however older methods of moving data such as ETL processes and FTP are an early 2000 answer to a 2025 problem. More organisations want to duplicate their legacy data alongside their distributed systems data for analytical, AI and ML cloud-based initiatives having a more secure, robust, and automated way of achieving this. Join this session to learn about:
All with the latest security and standards which are at the top of your agenda. The session will complete with a demo showing :
KISCO : The Danger Within
Common IBM i risks could be in your system right now Many organizations running IBM i have ignored its security configuration, believing it to be inherently secure and trusting instead on perimeter network security. Meanwhile, the platform's vulnerabilities – while once minor – have built-up over time over time so that now, IBM i is a bad actor’s dream. In this session, Carol Woodbury will show some of the commonly ignored vulnerabilities and how easily they can be exploited. IBM i is secure-able. But organizations must take action and stop ignoring their IBM i security configuration.
About Carol Woodbury: Carol Woodbury is the IBM i Security Subject Matter Expert (SME) at Kisco Systems. With over 30 years experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. She has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate about teaching the global IBM i community how to get and stay secure on the platform. Carol has been an IBM Power Champion since 2018. She is an architect, educator, implementer and an award-winning speaker and author with specialties in IBM i (AS/400, iSeries), along with general security and compliance concepts.
Carol is a Certified Information Systems Security Professional (CISSP) and Certified in Risk and Information Systems Control (CRISC) and is a member of the ISACA organization. Her popular textbooks, including “IBM i Security and Administration - 3rd edition” and “Mastering IBM i Security,” are available at MCPressOnline or amazon.com.
Kyndryl : Cybersecurity on IBM i: Are You Truly Protected?
The IBM i platform is renowned for its robust security capabilities. However, misconfigurations or improper usage can lead to significant vulnerabilities. This concern was echoed by 77% of respondents in the IBM i Paint points 2025 survey, who identified Cybersecurity as their top priority. About Kyndryl Kyndryl emerged from the spin-off of IBM’s infrastructure services. With over 30 years of experience in IBM i environments, a broad customer base, extensive IBM i resources across Europe and globally, and a dedicated security and cybersecurity division (PASSI-certified), Kyndryl stands out as the partner of choice for this platform. Expert Session During this session, specialists from Kyndryl’s Security division and IBM i platform will share insights and best practices on cybersecurity:
They will present actionable strategies to strengthen the security posture of your IBM i environment