Data Set Encryption - Just Do It
Project and Program: Enterprise Data Center
, Security and Compliance
, SHARE Virtual 2020
Greg & Julie will talk about the planning and steps for implementing data set encryption on z/OS.
We will discuss the steps that you need to execute as you implement data set encryption in your environment, and we'll zero in on the ones that are the most critical: securing the resources that protect your data and key management!-Julie A. Bergh-Rocket Software; Greg Boyd-Mainframe Crypto
Back to Proceedings File Library