Stream: Virtual Room 5
Time: 13:30 - 14:30
So, you've just switched Resource Security on…
How do you now keep your security definitions up-to-date before you put application changes into production?
This presentation will cover the new ways of detecting when requested changes to CICS applications will cause deviations from your existing security, and then how to integrate these techniques into a DevOps pipeline, contributing towards a bigger DevSecOps goal.
Mark is a CICS Software Developer based at the IBM Hursley laboratory in the UK.
Since joining CICS in 2020, Mark has delivered a number of Security features and enhancements to the CICS product as well as delivering improvements to the CICS development process with the integration of new tools and practices.
Prior to CICS, Mark has worked in Test Architect, Technical Lead, Team Lead, DevOps, Verification & Validation, and System Integration roles within the Information Technology, Finance, and Defence industries.
Outside of software development, Mark is active in patenting and is an IBM Senior Inventor.
Mark is a CICS Software Developer based at the IBM Hursley laboratory in the UK.
Since joining CICS in 2020, Mark has delivered a number of Security features and enhancements to the CICS product as well as delivering improvements to the CICS development process with the integration of new tools and practices.
Prior to CICS, Mark has worked in Test Architect, Technical Lead, Team Lead, DevOps, Verification & Validation, and System Integration roles within the Information Technology, Finance, and Defence industries.
Outside of software development, Mark is active in patenting and is an IBM Senior Inventor.
Click here to give some Feedback so we can make it even better next year!