Thomas Barlen

IT consultant architecting and implementing security solutions mainly in the IBM i and AIX area. I am also a frequent speaker at technical conferences. Specialties: Cryptography, Single Signon, Security assessments, Access Control concepts and implementation, IBM i networking, IBM i cryptographic programming, LDAP, IBM PowerSC, IBM PowerSC MFA. I am also the developer of the IBM i Syslog Reporting Manager (SRM).

The speaker's profile picture

Sessions

11-18
10:00
180min
Automate certificate management on IBM i using REST APis
Thomas Barlen

With more and more systems having TLS encryption enabled, the manual task of monitoring certificate expiration and renewing

Security
Sterrennacht
11-19
16:20
50min
Compliance and security management on IBM i with IBM PowerSC
Thomas Barlen

Managing the security and compliance on different IBM i systems and partitions can be a challenging task. Changing a setting
is quite simple, but automatically checking if a security setting remains the same over time and getting notified about a change is
a challenge. IBM offers a product called IBM PowerSC. This product uses compliance profiles to perform the necessary security
configuration and monitors that the systems remain compliant. It offers a single user interface that lets you monitor the compliance
and security of all your IBM i, Linux on Power, AIX, and VIOS partitions on your Power System. It provides more security functions for
malware detection, PTF level currency checking, and more. This session shows you what PowerSC is, how it works, and based
on the Center for Internet Security (CIS) IBM i benchmark how to apply a compliance profile. You also see the reporting capabilities
of the product, which offers administrators and auditors a comprehensive overview of the security state of your IBM i landscape.

Security
Sterrennacht
11-19
11:15
50min
Protect Your IBM i Objects and Data with Authority Collection
Thomas Barlen

For many years, companies use applications whose IBM i objects provide excessive access to all user profiles on a system.
This can easily lead to data theft and unauthorized manipulation of data. However, since administrators are afraid of breaking an application,
they typically never change object permissions. A feature called Authority Collection can help administrators to implement a
Principle of Least Privilege without breaking a application and at the same time properly secure the application environment. Join this
session to learn about the Authority Collection feature, how it is being used, and what you need to do with the collected information
to better protect your application objects without breaking anything.

Security
Cipress