Close

Best Practices for Securely Bypassing z/OS Dataset Access Controls

(7F)

Stream: Virtual Room 7
Time: 16:15 - 17:00


Presentation

Description

This session explores the challenges and best practices for authorized applications that require bypassing z/OS security controls when accessing datasets. We will delve into legitimate reasons for bypassing security restrictions, analyze historical "bad" and ugly" techniques used to circumvent security, compare these with modern, secure approaches, and provide recommendations for developers and security professionals to ensure secure and compliant dataset access.

Attachments

There is currently no attachment for Best Practices for Securely Bypassing z/OS Dataset Access Controls

Speakers


  • Emil Kotrc at Broadcom Mainframe Software
  • Emil is an experienced Principal Software Architect with a demonstrated history of working in the computer software industry. Skilled in IBM Db2, Agile Methodologies, Databases, and IBM Mainframe. Strong engineering professional with a Ph.D. focused in Mathematical engineering from Czech Technical University in Prague. Emil is also an active member of the International Db2 User Group (IDUG), member of IDUG content committee, speaker at international conferences, and an IBM Champion since 2015.


    Email: emil.kotrc@broadcom.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!