Stream: Virtual Room 7
Time: 14:00 - 15:00
You've implemented Pervasive Encryption. Woohoo! You know the encryption pyramid and understand the tradeoffs between storage level encryption, file and dataset level encryption, database encryption and application level encryption. Very nice!
How do you verify that you have configured your system to use your intended crypto engines? How do you determine if there are old applications using vulnerable algorithms or weak bit lengths? How do you show your auditor that your PCI workloads are using strong cryptography?
With IBM z16, IBM provides processor activity instrumentation to count cryptographic operations. SMF 30 records have been enhanced to include new crypto counter sections that contain counters for CPACF cryptographic instructions utilized by a job in a given period. Join this session for a demo and discussion of ways to use this data to aid in compliance, performance, and configuration.
Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio. Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 19 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.
Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio. Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 19 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.
Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio. Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 19 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.
Eysha Shirrine Powers is the Chief Architect of the IBM Z Cryptographic Portfolio. Most people know Eysha as a HUGE crypto nerd. She has a background in software engineering, and has spent the last 19 years designing and developing cryptography & security solutions to protect sensitive data. Eysha travels throughout the US and abroad to provide expertise and guidance to IBM clients.
Click here to give some Feedback so we can make it even better next year!