Fortify and Conquer: Secure Coding Strategies for IBM i Developers

Embark on an exploration of IBM i security challenges as we navigate the dangerous landscape of common vulnerabilities on IBM i. Don’t miss the chance to fortify your coding skills and conquer the challenges of secure IBM i development!

In this session tailored for ILE developers (including RPG and CL developers), we’ll dissect real-world examples of security pitfalls in our sample software, exploring issues like object authority, adopted authority, and library list vulnerabilities. Discover actionable solutions that empower you to reinforce your IBM i code so it is ready to face threats lurking in the wild.

Learning Objectives:
1. Learn from correcting real-world examples of vulnerabilities in a set of sample applications.
2. Understand the basics of creating more secure software on IBM i.

Location: W205 Date: June 4, 2024 Time: 1:20 pm - 2:30 pm Brian Nordland