Sched.com Conference Mobile Apps
Virtual POWERUp 2020
has ended
Create Your Own Event
Virtual POWERUp 2020
-
Saved To
My Schedule
Schedule
Simple
Expanded
Grid
By Venue
Speakers
Exhibitors
Attendees
Search
or browse by date + venue
Application Development
Attendee Labs
All
Application Development
Client Connectivity
Database
High Availability Resilience
Middleware (other)
Open Source Languages
Quantum Computing
RPG
Security
Business Development
Client Connectivity
Database
All
Application Development
Expo
High Availability
Internet of Things (iOT)
Lunch and Learn
All
Application Development
Business Development
Database
High Availability
Open Source Languages
Security
Systems Management
Middleware
Open Source Languages
RPG
Security
All
Systems Management
Systems Management
Virtualization
Web Applications
Audience
Intermediate
Popular
menu
Menu
Log in
Sign up
Schedule
Speakers
Exhibitors
Attendees
Search
Popular Security Events
#1
Basics of Security on IBM i: Part I
#2
Basics of Security on IBM i: Part II
#3
Best Practices of Security: Part II, Including IFS Security
#4
HALF DAY WORKSHOP: Preparing for and Investigating the Unthinkable... Your IBM i has been attacked
#5
Best Practices of Security: Part I
#6
Encrypt Your Data: IBM i Cryptography 101
#7
Basics of Security on IBM i: LIVE Q&A and Panel Discussion
#8
Audit your System: Configuration Auditing
#9
Audit your System: Monitoring and Reporting on IBM i Compliance and Security
#10
Security Considerations for Programmers: Part I
#11
Best Practices of Security: LIVE Q&A and Panel Discussion
#12
Security Considerations for Programmers: Part II
#13
Understanding Network Security: Securing Network Applications with Digital Certificates
#14
Do You Need a Firewall: Exit Point/Exit Programs
#15
Encrypt Your Data: FIELDPROC and OAR
#16
Understand Emerging Security Threats: Criticality of Cyber Security
#17
Audit your System: LIVE Q&A and Panel Discussion
#18
Understanding Network Security: IBM i Network Security Technologies
#19
Understand Emerging Security Threats: State of Security
#20
Security Considerations for Programmers: LIVE Q&A and Panel Discussion
#21
Do you Need a Firewall: IBM i Intrusion Detection and Intrusion Prevention Systems (IDS/IPS)
#22
Encrypt Your Data: LIVE Q&A and Panel Discussion
#23
Understand Emerging Security Threats: LIVE Q&A and Panel Discussion
#24
Understanding Network Security: LIVE Q&A and Panel Discussion
#25
Do you Need a Firewall: LIVE Q&A and Panel Discussion
Popular by Type
All Types
Application Development
Attendee Labs
Business Development
Client Connectivity
Database
Expo
High Availability
Internet of Things (iOT)
Lunch and Learn
Middleware
Open Source Languages
RPG
Security
Systems Management
Virtualization
Web Applications
Popular by Day
All days
Monday, Sep 14
Tuesday, Sep 15
Wednesday, Sep 16
Thursday, Sep 17
Friday, Sep 18
Recently Active Attendees
Torbjörn Appehl
Steve Bradshaw
Marina Schwenk
Dawn May
GB
Gary Bowers
Ian Cartwright
CI
Carlos Irigoyen
Jack Woehr
More →