| 09:00 – 10:10 | John Hornibrook, IBM Db2 Query Optimization 101 session  | 
| 10:15 – 11:20 | Greg Stager, IBM Best practices: Step by step instructions to configure a secure database system  | 
| 11:30 – 12:50 | Mitchell Waite, IBM Light at the end of the encrypted tunnel  | 
| 12:50 – 1:00 | IDUG announcement and closing remarks | 
