Education

SHARE Security and Compliance Webcast Series: Top 10 Security Vulnerabilities

Learn more about this series and see the Top 10 below and in this flyer.


Earn Your Security Warrior Badge!

When you attend 11 or more webcasts in the Security and Compliance Series, you will earn your Security Warrior badge that can be added to your social media profiles such as LinkedIn, email signature and more. There is no sign-up required - SHARE will track attendance at each webcast.   


Crypto Lockdown

Date and Time: Thursday,  April 14 | 10:00 a.m. CDT
Speaker: Eysha Shirrine Powers, Enterprise Cryptography, IBM Corporation

Join this session to learn best practices for securing your crypto environment. Activate SAF profiles to protect ICSF resources using the CSFSERV, CSFKEYS, CRYPTOZ and DATASET classes. Use the TKE workstation to configure access control points for Crypto Express HSMs. Determine the tradeoffs of various configuration settings.

Register Now


Finding #3:  Sensitive Data Sets with global access Greater than NONE  

Date and Time: Thursday,  April 28 | 10:00 a.m. CDT
Speakers: Byron Smith, Technical Engineer II, M&T Bank, Julie Bergh, WW Security Executive, Sirius Computer Solutions

Hear from security experts how to find, report and remediate #3 - sensitive data sets with global access greater than NONE for CA ACF2, IBM RACF and CA Top Secret and a discussion around how a user company implemented pervasive encryption to further protect sensitive datasets.

Register Now


SHARE Security Series: Taming the Skyrocketing Usage of Digital Certificates

Date and Time: Thursday, May 12 | 10:00 a.m. CDT
Speakers: Julie Bergh, WW  Security Executive, Sirius Computer Solutions, Charles Mills, Consultant

Certificate usage is becoming more and more widespread. As a mainframe security administrator the burden is falling on you, but much of the certificate process may be a mystery: Key Rings, Certificate Authorities, Private Keys, Intermediate Certificates, Signing Requests – what do they all mean? And how do I issue the RACF commands to make them all work? This session will make sense out of all of those terms and more, show you how they are used by RACF, and most importantly, show you a better, faster and easier way of issuing all of those certificate commands.

Register Now


Finding #2:  Inappropriate Usage of z/OS UNIX Superuser Privilege, UID = 0

Date and Time: Thursday,  May 26 | 10:00 a.m. CDT
Speaker: Phil Young

Hear from security experts how to find, report and remediate #2 - inappropriate usage of z/OS UNIX superuser privilege, UID = 0 for CA ACF2, IBM RACF and CA Top Secret.  

Register Now


SHARE Security Series: Understanding Format-Preserving Encryption for non-cryptographers

Date and Time: Thursday,  June 9 | 10:00 a.m. CDT
Speaker: Phil Smith III, Senior Architect & Product Manager, Mainframe & Enterprise Micro Focus (Voltage)

As data security requirements grow, it has become clear that while disk-, file system-, file-, and database level encryption schemes provide value, they are not sufficient: the gold standard is application-level, data-specific field-level encryption. Format-Preserving Encryption (FPE) is gaining in popularity as the way to provide this level of data protection, especially since NIST Special Publication 800-38G blessed its use in 2016 as a mode of AES.  How does this majick work? It turns out to be (conceptually) relatively simple. Yet it requires a change in thinking about how encryption is used in order to maximize the benefits.

Register Now


Finding #1:  Excessive Number of User IDs with No Password Interval

Date and Time: Thursday,  June 23 | 10:00 a.m. CDT
Speaker: Brian Marshall, President, Vanguard Integrity Professionals

Hear from security experts how to find, report and remediate #1 - excessive number of user IDs with no password interval for CA ACF2, IBM RACF and CA Top Secret.  

Register Now


SHARE Security Series - Expert Panel Session

Date and Time: Thursday,  July 21 | 10:00 a.m. CDT
Speakers: All 

Attend the wrap-up of the SHARE Security Series to hear from the security experts on what they see as the next security challenge.  This is your opportunity to get outstanding questions answered and provided feedback on what you want to hear next.  

Register Now