Stream: Virtual Room 7
Time: 12:30 - 13:15
z/OS was never built to withstand modern cyber attacks. See how ransomware, data theft, malware and modern attacks can be neutralized in seconds. Massive
In this session you will learn about:
• Common attack vectors that have compromised z/OS sites
• Protect – how to intercept malicious events that precede an attack
• Detect – how to instantly detect and suspend an attack in progress
• Respond– how to reduce human reaction time and tailor restore processes to minimize damage
• Recover – how to get both data and your systems back to a trusted state.
New solutions provide 24/7 vigilance to prevent and recover in a fraction of the time required with conventional tools. Compliant with DORA, Zero Trust, PCI and NIST requirements new solutions can make z/OS super-resilient, while other platforms languish.
There is currently no attachment for Turning the tables on Cyber Criminals
Al Saurette has been delivering innovation to IT problem areas for over 40 years. Al is a thought leader in the area of security and compliance for major banks, insurance and government clients throughout North America and Europe. Al is now focused on combating ransom attacks - Ransomware, malicious encryption, data exfiltration and real-time response to internal threats of all types.
Al@MainTegrity.com www.maintegrity.com
Click here to give some Feedback so we can make it even better next year!