The Billion Dollar Product - "Online Privacy" Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance In this session we will be discussing the erosion of online privacy.... Learn more
Live: Subsystem Security for Dummies Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance In this session we will look at the basic security controls for CICS,... Learn more
Needle in the Haystack ... Where is That Sensitive Data Located on Disk? Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Compliance with privacy laws are creating even more internal audit... Learn more
Data Privacy and the Insider Threat Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Data privacy and the insider threat are closely connected. So closely... Learn more
Security Opening:Â AÂ Security Potpourri Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance In this session the presenter will go in depth into the various options... Learn more
Experiences with Two Factor Authentication (2FA) on z/OS Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Have you authenticated to your z/OS system with a token yet? Come... Learn more
Best Practices for Securing Privileged Accounts Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance New risk factors and compliance requirements are making mainframe... Learn more
Live: Protection Begins with Data at the Center: Encrypt it All with z Systems Pervasive Encryption Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance The world is built upon an intrinsic trust that we, as clients and... Learn more
Structuring Your Organization's Controls to Effectively be Responsive to Audits Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance This session will identify what auditors will likely look for, how they... Learn more
The Encryption Pyramid: Choosing the Level That Works for You Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Data at rest can be encrypted at multiple levels. Attend this session... Learn more
Payment Card Industry Trends and Your Crypto Express Cards Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Join this session for a tour of the important security updates... Learn more
What's New in z Systems Crypto: Enterprise Key Management Edition Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Encryption is based on solid algorithms and cryptographic keys.... Learn more
Live: Deploying Pervasive Encryption in the Enterprise -- A Business and Technical Perspective Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Deploying pervasive encryption can help IT organizations meet both the... Learn more
Vulnerability Patterns on z/OS:Â Lessons from the IBM Secure Engineering Team Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Come learn from the experts on the the IBM z/OS Secure Engineering... Learn more
P@$$w0rd - or passwords?? Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Authentication on the mainframe has been a user ID and password.... Learn more
What is GDPR and Why Do I Care? Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance The General Data Protection Regulation (GDPR) was adopted in the... Learn more
RACF Security Event Monitoring (Maximizing your SIEM ROI) Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Do you wonder if you are getting the full story on all the activity... Learn more
What is SETROPTS and Why is it Important? Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance In the hands of a RACF Security Administrator, SETROPTS is an... Learn more
Cybercrime Fighting for Mainframe Superheroes – A Holistic Approach Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Hackers probing your enterprise use a single-system approach to finding... Learn more
CA Mainframe Security Update and Hidden Gems Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance CA ACF2 and CA Top Secret R16 product update, including the road ahead... Learn more
Zero-Day Vulnerabilities in the z/OS Operating System Layer Tags: Proceedings, SHARE Providence 2017, 2017 Categories: Enterprise Data Center, Security and Compliance Today's current security focus is on the application layer, the... Learn more
Finding the Needle in a Haystack - Diagnosing Common OpenSSH Problems Tags: Proceedings, 2017, SHARE San Jose 2017 Categories: Enterprise Data Center, Security and Compliance In this session our speakers will provide detailed diagnostic steps for... Learn more
Using z/OS Communication Server Intrusion Detection Services Tags: Proceedings, 2017, SHARE San Jose 2017 Categories: Enterprise Data Center, Security and Compliance There are many types of intrusion detection systems being deployed... Learn more
End to End Encryption Options on z/OS Tags: Proceedings, 2017, SHARE San Jose 2017 Categories: Enterprise Data Center, Security and Compliance As enterprises pursue end-to-end encryption strategies, IT staff is... Learn more
Effective Network Trace Analysis Tags: Proceedings, 2017, SHARE San Jose 2017 Categories: Enterprise Data Center, Security and Compliance Network traffic analysis at the packet level is critical to diagnosing... Learn more