Rocket Software : Multiplatform Secure, Seamless Data Replication  

Presenter: Andrew Simpson – Solutions Architect Rocket Software.

Your IBM i is the strategic platform of choice for your organisation, however older methods of moving data such as ETL processes and FTP are an early 2000 answer to a 2025 problem. More organisations want to duplicate their legacy data alongside their distributed systems data for analytical, AI and ML cloud-based initiatives having a more secure, robust, and automated way of achieving this. Join this session to learn about: 

  1. One off bulk data load : Replicate your data by automating to cloud based services with no coding required.
  2. Utilise Change Data Capture (CDC) : IBMi data changes automatically synchronised, staged and loaded into cloud-based services.
  3. Encapsulate RPG and Cobol Business Logic: Both screen and non-screenbased programs can be converted into modern advanced APIs to then load business logic centric data into cloud based services. No more having to duplicate business logic into stored procedures.

 All with the latest security and standards which are at the top of your agenda. The session will complete with a demo showing :

  1. The bulk loading of IBMi DB2 tables into a cloud-based database.
  2. Encapsulating business logic from an IBMi RPG program and loading that business logic enriched data into a cloud-based database.
  3. Transactional Data Changes (CDC) loading into a cloud-based database and publishing to Kafka.

KISCO : The Danger Within 

Common IBM i risks could be in your system right now Many organizations running IBM i have ignored its security configuration, believing it to be inherently secure and trusting instead on perimeter network security. Meanwhile, the platform's vulnerabilities – while once minor – have built-up over time over time so that now, IBM i is a bad actor’s dream. In this session, Carol Woodbury will show some of the commonly ignored vulnerabilities and how easily they can be exploited. IBM i is secure-able. But organizations must take action and stop ignoring their IBM i security configuration. 

About Carol Woodbury: Carol Woodbury is the IBM i Security Subject Matter Expert (SME) at Kisco Systems. With over 30 years experience in the area of IT security, Carol is known world-wide as an expert in the area of computer security. She has architected security solutions for Fortune 100 companies as well as small and medium-sized organizations. Carol is passionate about teaching the global IBM i community how to get and stay secure on the platform. Carol has been an IBM Power Champion since 2018. She is an architect, educator, implementer and an award-winning speaker and author with specialties in IBM i (AS/400, iSeries), along with general security and compliance concepts.

Carol is a Certified Information Systems Security Professional (CISSP) and Certified in Risk and Information Systems Control (CRISC) and is a member of the ISACA organization. Her popular textbooks, including “IBM i Security and Administration - 3rd edition” and “Mastering IBM i Security,” are available at MCPressOnline or amazon.com.


Kyndryl : Cybersecurity on IBM i: Are You Truly Protected? 

The IBM i platform is renowned for its robust security capabilities. However, misconfigurations or improper usage can lead to significant vulnerabilities. This concern was echoed by 77% of respondents in the IBM i Paint points 2025 survey, who identified Cybersecurity as their top priority. About Kyndryl Kyndryl emerged from the spin-off of IBM’s infrastructure services. With over 30 years of experience in IBM i environments, a broad customer base, extensive IBM i resources across Europe and globally, and a dedicated security and cybersecurity division (PASSI-certified), Kyndryl stands out as the partner of choice for this platform. Expert Session During this session, specialists from Kyndryl’s Security division and IBM i platform will share insights and best practices on cybersecurity: 

  • Lionel Balmain, Certified Architect and CTO of the Security & Resiliency practice
  • Julien Twardowski, IBM i SME, specialized in security

They will present actionable strategies to strengthen the security posture of your IBM i environment