Stream: Virtual Room 7
Time: 16:15 - 17:00
This session explores the challenges and best practices for authorized applications that require bypassing z/OS security controls when accessing datasets. We will delve into legitimate reasons for bypassing security restrictions, analyze historical "bad" and ugly" techniques used to circumvent security, compare these with modern, secure approaches, and provide recommendations for developers and security professionals to ensure secure and compliant dataset access.
There is currently no attachment for Best Practices for Securely Bypassing z/OS Dataset Access Controls
Emil is an experienced Principal Software Architect with a demonstrated history of working in the computer software industry. Skilled in IBM Db2, Agile Methodologies, Databases, and IBM Mainframe. Strong engineering professional with a Ph.D. focused in Mathematical engineering from Czech Technical University in Prague. Emil is also an active member of the International Db2 User Group (IDUG), member of IDUG content committee, speaker at international conferences, and an IBM Champion since 2015.
Click here to give some Feedback so we can make it even better next year!