Close

Protecting your Db2 for z/OS environment from cyber attacks

(7D)

Stream: Virtual Room 7
Time: 13:45 - 14:30


Presentation

Successful cyber-attacks - ransomware attacks in particular - can have a devastating impact to your business. Depending on the individual attack scenario, existing processes to maintain business continuity such as the implementation of GDPS using multiple physical sites may not be able to protect you from these attacks. In this session, we look at options to reduce a potential data loss and the downtime to restore your Db2 for z/OS production environment in the most efficient way to optimize both your Recovery Point Objective (RPO) and Recovery Time Objective (RTO) after a cyber attack.

Attachments

There is currently no attachment for Protecting your Db2 for z/OS environment from cyber attacks

Speakers


  • Jørn Thyssen at Rocket Software UK Ltd
  • Jørn Thyssen is a Senior Technical Staff Member at Rocket Software, working with mainframe and Db2 tools in customer modernization and performance projects. He has extensive experience with IBM Z and Db2 for z/OS, and collaborates closely with development teams on initiatives involving hybrid cloud and AI. Before joining Rocket Software in 2017, Jørn held technical roles at IBM in development, architecture, and technical sales across the Nordic region. He holds a Ph.D. in theoretical chemistry from the University of Southern Denmark and is recognized as a 2025 IBM Champion. He is based in Randers, Denmark.


    Email: jthyssen@rocketsoftware.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!