Stream: 102
Time: 15:00 - 16:00
Mainframe infrastructure vulnerabilities can come from a variety of sources, including hardware configurations, IPL parameters, External Security Manager (ESM) configurations, and operating system programs. Most z/OS systems have tens of thousands of authorized programs, including software from internal teams and independent software vendors. This session will focus on how operating system vulnerabilities get introduced into the operating system layer using authorized programs. You will learn:
• The importance of the IBM Statement of Integrity and the impact it has on the z/OS architecture.
• What impact the Statement of Integrity has on mainframe security.
• What can happen when a poorly designed authorized program is introduced into a z/OS system.
• What categories and types of vulnerabilities can be exploited on the mainframe.
Email: roverby@rocketsoftware.com
Click here to give some Feedback so we can make it even better next year!