SHARE’D KNOWLEDGE

SHARE Dallas 2022 Recordings

Search by Format
Search by Type
Sort By
Search by Keyword
  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    z/OS 2.5 added many security updates. Not just RACF. Come to this session to learn about some of the new items in z/OS 2.5 security. For example, data privacy diagnostics, z/OSMF enhancements for Security Configuration Assistant, the z/OS authorized code scanner, SDSF, as well as some new z/OS health checks.

  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    What are the latest RACF features that are of interest to every installation? In this session, we examine the new RACF enhancements available in the latest releases of z/OS. Topics that we will cover include: * New RACF Health Checks, * RACF VSAM Database Option, * New RACF/SAF C header files, * Ability to restrict ALTER access, * Digital Certificate Fingerprint Support and * Enhanced PassTickets and more!

  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    Join us to discuss what is new (and not so new) in ACF2 and Top Secret. In addition, we will review Advanced Authentication Mainframe and Trusted Access Manager for Z both of which Broadcom ESM users are entitled to. We will also touch on which Features will start your journey to get to a Zero Trust security model.

  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    Ransomware is a growing concern. Cybercriminals have monetized data breaches effectively and it has now become a billion-dollar industry. IBM Z is a critical part of the world's IT infrastructure. For this reason, it is prudent that we all think about the attack vectors and how best to put in place controls to protect the most sensitive data stored on IBM Z. In this session our speaker will discuss ransomware and share a point of view on how best to mitigate on system Z.

  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    The Enterprise Knights of IBM Z is an expanding user group providing grassroots insights to z/OS security & resiliency. Our team has co-created multiple Escape Room experiences, the Security Guru game show, Knights badging, the new Thwarted by IBM Z! video & blog series, and even the online card game, MUSE CUES. Come to this session to meet several of the Knights in person to learn more about applying Zero Trust principles to z/OS, including its many V2R5 enhancements. Compete in new trivia challenges that can help you get on the MUSE CUES leaderboard!

  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    The presenters will discuss audit findings and how to mitigate them with emphasis on all three External Security Managers. Following this overview, Nibbles will be prepared for audit findings in RACF, ACF2 and Top Secret.

  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    Mainframe is a critical part of modern Hybrid IT. However, the shift in operations due to the open Mainframe approach and the changing IT landscape can lead to changing risk. Listen to a panel discussion highlighting multiple perspectives on how organizations are navigating challenges, how they are getting ahead of the challenges, and pitfalls to avoid. Panelists include:

  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    Is it challenging to administer and manage digital certificates and keyrings on z/OS? What about detecting certificate expirations and managing renewals? Want to discover more on securing Web apps or REST API services on z/OS? This session will touch upon digital certificate & keyring administration across all three ESMs - CA ACF2, CA TSS and IBM RACF. We will also showcase how to harness the power of digital certificates to secure a multi LPAR deployment of Zowe based microservices.

  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    The COVID crisis quickly forced companies to transition from in house co-located departments of employees to much of their personnel remote working from home. In fact, this paradigm shift has changed the business culture and as companies look to hire the next generation of workers, the ability to remote work has become a powerful hiring tool and benefit that can be offered when recruiting potential employees. However, opening up your mainframe for remote access by employees, partners and suppliers has created a whole host of mainframe security concerns. The shift to a more remote workforce has revealed new data security challenges, and closely monitoring activity on the mainframe has become an integral part of a successful businesses everyday security strategy. Knowing who and from where your data is being accessed is as important as what data is being accessed. Datalenz by Iconium Software provides an overwatch of data on the mainframe and provides real time alerting anytime an unwanted incursion occurs.

  • Product not yet rated Contains 1 Component(s) Recorded On: 03/28/2022

    2021 has seen the names of Colonial Pipeline, JPMorgan Chase Bank, Apple, Solairus, Microsoft & California DMV in the news for hacks, ransomware and phishing attempts. These types of activities require strict diligence and enforcement of the operating environment. Our speakers will discuss why understanding and discovering the systems environments' vulnerabilities and closing the identified gaps, while preventing the gaps from reappearing has become more critical than ever and why a rigorous best practice is required.