Close

Achieving Zero Trust In The Z Environment

(AA)

Stream: Virtual Room A
Time: 10:00 - 10:45


Presentation

Mainframe known as the best secure/securable platform. ESM integrations, security mechanisms exist in the base OS and also some rumors like less known environment therefore no one can hack the MF are some of the examples of the perception. Implementing MFA to protect the Z accounts, protecting data at rest and in transit with Pervasive Encryption and least privilege access can help to achieve zero trust strategies to secure the Z environment. Are they enough? Regular pentesting, tool based continuous security controls, threat detection and more is needed to improve the security posture of the environment. You will see brief implementation journey to achieve a total protection gained at Garanti BBVA Technology.

Speakers


  • Adnan Can at Consultant
  • More than 30 years of experience around Z echo system, including Infrastructure, Disaster Recovery and Information Security areas. Currently working as a Senior Security Architect to research, investigate new security technologies, solutions, products to improve the security posture of the environment. Residing in a beautiful and complex city, Istanbul, with my wife and two daughters.


    Email: adnan.cann@gmail.com

    Feedback

    Click here to give some Feedback so we can make it even better next year!