BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Common - ECPv6.15.15//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://www.common.org
X-WR-CALDESC:Events for Common
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/Chicago
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20250309T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20251102T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20260308T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20261101T070000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0600
TZOFFSETTO:-0500
TZNAME:CDT
DTSTART:20270314T080000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0500
TZOFFSETTO:-0600
TZNAME:CST
DTSTART:20271107T070000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260407
DTEND;VALUE=DATE:20260410
DTSTAMP:20260408T201123
CREATED:20260302T142452Z
LAST-MODIFIED:20260302T153306Z
UID:12091-1775520000-1775779199@www.common.org
SUMMARY:NEUGC
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/neugc/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260427
DTEND;VALUE=DATE:20260501
DTSTAMP:20260408T201123
CREATED:20250914T170030Z
LAST-MODIFIED:20250915T173913Z
UID:10745-1777248000-1777593599@www.common.org
SUMMARY:POWERUp 2026
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powerup-2026/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/Chicago:20260506T110000
DTEND;TZID=America/Chicago:20260506T120000
DTSTAMP:20260408T201124
CREATED:20260403T021103Z
LAST-MODIFIED:20260403T173700Z
UID:12252-1778065200-1778068800@www.common.org
SUMMARY:POWERcast: Build an IBM i Firewall Using Exit Point Management
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/powercast-build-an-ibm-i-firewall-using-exit-point-management/
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20260602
DTEND;VALUE=DATE:20260603
DTSTAMP:20260408T201124
CREATED:20260127T210646Z
LAST-MODIFIED:20260320T133635Z
UID:11870-1780358400-1780444799@www.common.org
SUMMARY:COMMON LATAM
DESCRIPTION:POWERcast Build an IBM i Firewall Using Exit Point Management				\n				\n					\n				\n		\n					\n		\n				\n				\n									Date: May 6\, 11:00 AM\, CTSpeaker: Lloyd Ramdarie \nIBM i doesn’t provide its own firewall. However\, IBM i exit points provide powerful capabilities to control\, monitor\, and secure user activity across services such as FTP\, SQL\, ODBC\, and data transfers. \nJoin SEA on May 6th to learn how to build a powerful\, customizable IBM i firewall using an exit point manager like iSecurity Firewall. They show you how to:• Build an effective IBM i firewall using exit point management• Use exit points to protect your system against cyber threats and unauthorized access• Log and monitor user access activity • Generate management and audit reports tracking user behavior and security events \nAll attendees receive a complimentary copy of SEA’s Guide to Understanding IBM i Security with Exit Points\, an in-depth IBM i exit point management resource. 								\n				\n				\n				\n									\n					\n						\n									Register\n					\n					\n				\n								\n				\n				\n		\n				\n				\n					Free Courtesty of				\n				\n				\n				\n																														\n				\n				\n				\n																														\n				\n				\n		\n				\n					\n				\n		\n					\n		\n				\n				\n																														\n				\n				\n		\n				\n				\n									Lloyd Ramdarie is an IBM i Technical Support team member at Software Engineering of America. His has worked in the IBM i space for many years\, with heavy involvement in securing the IBM i.\nLloyd is a seasoned IT professional who can utilize his vast experiences and expertise to help you implement the very best end-to-end security solutions in the IBM i environment.
URL:https://www.common.org/event/common-latam/
END:VEVENT
END:VCALENDAR