Close X

Pervasive Encryption Demo: Guided Tour of Policy-Based Data Set Encryption


Presentation

Join this session for a step-by-step demonstration of data set encryption. See how to configure and start ICSF. See how to create Key Data Sets and generate cryptographic keys. See how to configure SAF resources and assign keys to data sets. See how to authorize data owners vs storage admins. Then read, write and print an encrypted data set.

(FF)

Stream: Enterprise Security
Room: Monza
Time: 11:45 - 12:45

Attachments

FF Attachments

Speakers


  • Eysha Powers at IBM USA
  • Eysha Shirrine Powers is a Cryptographic Software Designer and Developer with 15 years of experience in IBM Z Cryptography and Security. Eysha Shirrine has a passion for cryptography and has been designing and developing crypto software for z/OS Integrated Cryptographic Services Facility (ICSF) for 10 years. Eysha Shirrine created and maintains the IBM Crypto Education online community and regularly presents at SHARE, IBMTechU, Vanguard and other conferences.


    Email: eysha@us.ibm.com

  • Eysha Powers at IBM USA
  • Eysha Shirrine Powers is a Cryptographic Software Designer and Developer with 15 years of experience in IBM Z Cryptography and Security. Eysha Shirrine has a passion for cryptography and has been designing and developing crypto software for z/OS Integrated Cryptographic Services Facility (ICSF) for 10 years. Eysha Shirrine created and maintains the IBM Crypto Education online community and regularly presents at SHARE, IBMTechU, Vanguard and other conferences.


    Email: eysha@us.ibm.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!