Best Practices of Security with a DCM Deep Dive — Robert Andrews & Thom Haze

Understand all the different areas of security one needs to consider — not just on IBM i — and prevent common mistakes and data loss or intrusion.  >span class="NormalTextRun SCXW72245912 BCX0">.  Many of the built in IBM i Security features will be covered at a high level.  But something everyone should be using is TLS encryption.  >span class="NormalTextRun SCXW72245912 BCX0">.  Don’t miss it! 

Robert Andrews

Team Lead


Robert Andrews is the Team Lead for the IBM i Security and Authentication Lab Services Power Systems Delivery Practice in Rochester, MN.  He is an Executive Security Consultant and a certified Thought Leader in IBM for security.  Besides security, Robert is an expert in Db2, journaling, and DDM/DRDA.  In addition to his technical work at IBM, Robert has been strongly involved in Emergency Management and Communications for over a decade at all levels from local to federal.  Robert has published seven books and holds degrees in mathematics, computer science, education, and management.

Thom Haze

IBM i Operating System Security Development, IBM

Thom is the lead software developer for Digital Certificate Manager (DCM) and provides cryptography related enhancements to IBM i. He has been working on IBM i and earlier named platforms since 1989 on various projects such as Integrated Windows, Linux, and VMware Servers, Integrated File Server, IBM i Installation, and most recently on the IBM i Security team. Thom is a Certified Information Systems Security Professional (CISSP) focused on providing system availability,


Open to view video.
Open to view video.