Security Now! 10 Themes You Need to Discuss with Your Director or CIO to Secure Your Communications on the Mainframe Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance It seems like everyday there is another high profile cyber attack on a... Learn more
OpenSSH for z/OS: New Features and Functions Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance Release 1.3 of IBM Ported Tools for z/OS - OpenSSH was announced to be... Learn more
Understanding the Impact of the Network on z/OS Performance Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance Understanding network performance, and the impact it has on overall... Learn more
Hidden Gems in CA NetMaster for TCP/IP: Come Explore Where You May Have Missed Them Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance Have you ever wondered what other cool things you can do with CA... Learn more
Auditing z/OS Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance This session will provide you with real life experiences in planning,... Learn more
Intro to z/OS Crypto and ICSF Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance This session will introduce many of the cryptographic capabilities... Learn more
RACF SETROPTS - Exploring the Options Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance Explore the many RACF options that you can set with SETROPTS. Learn... Learn more
RACF Performance Tuning Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance Learn how to make RACF operate at peak efficiency. This session will... Learn more
NetView for z/OS: IP Management Topics and Solutions Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance Your IP network is stable and always works, right? Are you sure?... Learn more
A Forensic Analysis of Security Events on System z, Without the Use of SMF Data Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance This session will be a mixture of lecture using slides and a real time... Learn more
z/OS Mainframes at Risk – The Current Threat Landscape! Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance This session reviews current threat landscape, and what each of us can... Learn more
Are Your Auditors Driving You Crazy? Configuration Manager Implementation Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance In this session, the speakers will discuss how and why a company... Learn more
z/OSMF Configuration Assistant for z/OS Communications Server 2.1 Hands-on Lab, Part 1 of 2 Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance In z/OS V2.1 the "Configuration Assistant for z/OS Communications... Learn more
z/OSMF Configuration Assistant for z/OS Communications Server 2.1 Hands-on Lab, Part 2 of 2 Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance In z/OS V2.1 the "Configuration Assistant for z/OS Communications... Learn more
Leveraging z/OS Communications Server Application Transparent Transport Layer Security (AT-TLS) for a Lower Cost and More Rapid TLS Deployment Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance As security concerns continue to increase, more enterprises are... Learn more
RACF Update and Goody Bag Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance Come to this session to learn about new features in RACF and other... Learn more
SEC Project Kickoff - Recent z/OS Security Enhancements You May Have Missed Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance The Security & Compliance Project Opening will introduce you to the... Learn more
How Hackers Breached a Government (and a Bank) Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance In early 2012 a group of 3 hackers were caught when a Swedish... Learn more
Defending System z - A TCE (The Control Editor) Update Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance The Image Control Environment (ICE) is a System z Software Utility that... Learn more
What You Need to Do to Protect Yourself Against z/OS and z/VM Hacks Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance Hacking seems to make the news on a weekly basis. This session will go... Learn more
Cloud Network Security Tags: Proceedings, 2015, SHARE in Seattle 2015 Categories: Enterprise Data Center, Security and Compliance Security is the number one concern with use and deployment of... Learn more
Survival Tips for Big Data's Impact on Performance Tags: Proceedings, 2014, SHARE in Pittsburgh 2014 Categories: Enterprise Data Center, Security and Compliance The pressure is on to show tangible value from big data rollouts. Learn... Learn more
Configuring and Tuning SSH and SFTP on z/OS Tags: Proceedings, 2014, SHARE in Pittsburgh 2014 Categories: Enterprise Data Center, Security and Compliance This technical session provides in-depth information on how to install... Learn more
Security Challenges in the 21st Century: The Target Breach Tags: Proceedings, 2014, SHARE in Pittsburgh 2014 Categories: Enterprise Data Center, Security and Compliance Credit and debit cards—whether using magnetic stripes, EMV (“Chip and... Learn more
Selective Permissions Control with the UNIXPRIV Class Tags: Proceedings, 2014, SHARE in Pittsburgh 2014 Categories: Enterprise Data Center, Security and Compliance Permission to certain UNIXPRIV class profiles can provide users with... Learn more