Protecting Your Crown Jewels

Download PDF

Session title: Protecting Your Crown Jewels

Session abstract: This presentation will give an overall view of how to protect your most critical assets on z/OS. We will discuss overall strategy including DB2, RACF, Guardium, zSecure, encryption, database and file activity monitoring and how they feed your SIEM for actionable items in real-time. We will learn about a statement of direction regarding z/OS encryption. We will drill down into ways to protest your “crown jewels” from being accessed by inappropriate parties, and will alert you when they it has been accessed by authorized credentials.

Speaker biography: Howie has been working in IT for 37 years. He has extensive experience in DB2 for z/OS and now works as a CyberSecurity specialist. He has worked almost exclusively on z/OS systems for firms in the telecommunications, finance and health care insurance industries.  He is a co-author of the IBM Redbook, DB2 9: Packages Revisited. He has been with IBM for the last 10 years, and is currently the North American technical lead for Guardium Data Activity Monitor for z/OS and Guardium Data Encryption for DB2 and IMS Databases.