Guidelines for Managing z/OS Vulnerabilities
Project and Program: Enterprise Data Center
, Security and Compliance
, SHARE Sacramento 2018
Has anyone told you that all it takes is one zero day vulnerability in the z/OS operating system layer to bypass your ESM and all that you are doing to secure your data? Learn what a z/OS operating system layer vulnerability is and why these zero day vulnerabilities can compromise your mainframe. The vulnerability could be located in z/OS, IBM Software Products, Independent Software Vendor (ISV) supplied programs, or installation-added programs. See a demo of an exploit of a trap door vulnerability and learn what you must do to meet mainframe operating system vulnerability management compliance guidelines.-Ray S. Overby-Key Resources, Inc.
Back to Proceedings File Library