Close

Using CICS Security Discovery to implement resource and command security

(NZ)

Stream: Security
Time: 16:00 - 17:00


Presentation

Zero Trust and many compliance recommendations advise the use of resource security for protecting your sensitive data. This presentation and demo will cover how to migrate from using only CICS transaction security to add resource and command security.

 

Attachments

There is currently no attachment for Using CICS Security Discovery to implement resource and command security

Speakers


  • Lewis James at IBM UK LTD.
  • Lewis has been with IBM UK for 3 years. He works within the CICS TS for z/OS Development Team. Lewis is a strong advocate for early professionals on the mainframe.

    An early professional within IBM Z. He works as a member of the CICS Security team designing and developing new features to ensure the security and resillience of CICS TS.

    Lewis has been involved in the direct development of several CICS TS 5.6 & 6.1 features and has extensive knowledge in these areas especially those he has been involved in.

    Get in touch -
    Email: Lewis.James@IBM.com
    LinkedIn: https://www.linkedin.com/in/lewis-james/

     


    Email: Lewis.James@ibm.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!