SHARE Wants Your Feedback
Search the Catalog
Recommended For You
Recommendations are made based on your interests. To update your interests, visit your Profile.
For many years the presenter has discussed how systems can and are attacked by bad actors. This session is a little different as he will start to explore what we can do to prevent or if the worst happens how we can recover from an incident. We will look at the tools available as well as the testing required and the obvious and sometimes missed processes and procedures required to help protect the greatest IT platform ever invented :)
In this session, the presenter will review the need for Information Security Continuous Monitoring and why you should document your processes using the Broadcom Security Continuous Monitoring Playbook. Similar to a sports team, everyone can use a playbook that details what to monitor, who to notify, and what actions to take when critical events are detected. The presenter will review a detailed example of a playbook entry. The session will close the session with a discussion of the top security and system settings to monitor for changes.
IBM Z has a 40+ year history in security and cryptography, starting with the design of the Lucifer cipher in 1974 (which became the Data Encryption Standard, DES algorithm) to today, with enablement of Quantum Safe Cryptography for the IBM z16. IBM z16 introduces new capabilities in IBM Z hardware, operating systems, and middleware to provide quantum safe encryption and more. This session will cover new features in the IBM z16 Crypto Ecosystem, including z/OS Cryptographic Services (ICSF), in support of data protection.
|Access Date||Quiz Result||Score||Actions|