Stream: Melbourne
Time: 15:15 - 16:00
Abstract:
It’s a set of executable programs so powerful that IBM documents them to be an extension of z/OS. These programs come from IBM, from the z/OS vendor ecosystem, and from clients’ in-house development. z/OS pen testers frequently describe the APF as a prime target of pursuing privilege escalation. This session will discuss a defense-in-depth strategy in protecting this critical aspect of your security posture on z/OS.
Bryan Childs has been a z/OS mainframer at IBM for 36 years. He has coded primarily in the areas of RACF, Parallel Sysplex, and GRS. He served on the IBM Z Center for Secure Engineering for five years before transitioning to Product Management. He is now a Principal Product Manager for IBM Z Security Software, with special focus on IBM Threat Detection for z/OS (IBM TDz).
Click here to give some Feedback so we can make it even better next year!