SlideShare ist ein Scribd-Unternehmen logo
1 von 46
Downloaden Sie, um offline zu lesen
IBM	z	Systems	Security	Conference	| 27-30	September	| Montpellier
IBM	Systems
IBM	z	Systems	Security	Conference
Business	Security	for	today	and	tomorrow
> 27-30	September	| Montpellier
Mainframe	Security	– It’s	not	just	
about	your	ESM!
Rui	Miguel	Feio
Technical Lead	– RSM	Partners
1
Agenda
• Introductions
• Objectives
• Network	Controls
• Other	Controls
• Real	Life	Examples
• Taking	Security	Seriously	(or	Not)
• Conclusions
• Questions
Delivering	the	best	in	z	services,	software,	hardware	and	training.Delivering	the	best	in	z	services,	software,	hardware	and	training.
World	Class	z	Specialists
This	presentation
Initially	created	by	Mark	Wilson Improved	and	presented	by	me!
Introduction
• Technical	lead	at	RSM	Partners
• Been	working	with	mainframes	for	the	past	17	years	and	with	
computers	since	1984
• Started	as	an	MVS	Systems	Programmer	with	IBM	and	ended	up	
specialising	in	mainframe	security
• Experience	in	non-mainframe	platforms	as	well
• I	give	presentations	all	over	the	world
Objectives
Objectives
• Let’s	start	with	the	basics:
– ESM	stands	for	External	Security	Manager	
– RACF,	ACF2,	TSS
– ESM	helps	protect	the	mainframe
• But	what	does	it	mean	‘protect	the	mainframe’?	
• We	will	be	looking	at	some	of	the	other	security	controls	available	
and	a	number	of	non	ESM	related	security	controls	that	should	be	
used	to	protect	the	mainframe
Some	of	the	
Network	Controls
We	keep	hearing	non-mainframe	people	and	even	some	
mainframe	technicians	say:
“The	mainframe	is	fine,	it’s	behind	a	firewall…”
Network	Controls
• The	mainframe	is	part	of	an	ecosystem	of	different	platforms	and	
devices
• More	than	likely	one	or	more	devices	and	systems	of	this	ecosystem	
(including	the	mainframe)	will	be	connected	to	the	internet
• This	means	that	potentially	there	are	many	different	ways	to	reach	
the	mainframe
• We	need	to	consider:
– Intrusion	detection	services	(IDS),	TCPIP	security,	SENDMAIL	and	
SMTP	Security
Network	Controls
• Ask	yourself:	“How	much	do	I	actually	know	about	network	security	
and	what	features/facilities	IBM	have	built	into	the	system?”
• Who	in	this	room	has	a	clear	understanding	of:
– The	SERVAUTH	class
– TLS/SSL	vs AT-TLS	vs IPsec
– IP	Filtering
– Intrusion	Detection	Services	(IDS)
– Defence	Manager	(DM)
Let’s	check	this	one
SERVAUTH	Class
• The	SERVAUTH	resource	class	supports	TCP/IP	security
• Profiles	in	the	SERVAUTH	class	are	prefixed	with	EZB
• Second	qualifier	specifies	the	function	(for	example):
– EZB.STACKACCESS.**	to	protect	access	to	the	TCP	stack
– EZB.NETACCESS.**	to	specify	who	can	access	a	specified	network
– EZB.TN3270.**	to	protect	TN3270	Secure	Telnet	Port	Access
– EZB.PORTACCESS.**	to	specify	who	can	use	which	TCP	and	UDP	ports
• SERVAUTH	class	must	be	RACLISTed
SERVAUTH	Class
• EZB.STACKACCESS.sysname.tcpname
• EZB.NETACCESS.sysname.tcpname.netname
• EZB.PORTACCESS.sysname.tcpname.portname
• EZB.TN3270.sysname.tcpname.PORTnnnnn	
• EZB.NETSTAT.sysname.tcpname.netstatoption
• EZB.FRCAACCESS.sysname.tcpname
• EZB.MODDVIPA.sysname.tcpname
• EZB.SOCKOPT.sysname.tcpname.SO_BROADCAST
• EZB.NETMGMT.sysname.tcpname.SYSTCPDA
• EZB.NETMGMT.sysname.tcpname.SYSTCPCN
• EZB.NETMGMT.sysname.tcpname.SYSTCPSM
TLS/SSL	vs	 AT-TLS	vs	IPsec
• They	all	provide	encryption/certificate	for	TCP/IP…
• But	what	else	can	you	do	with	them?
• Who	knows	the	differences?
• Who	knows	the	restrictions?
TLS/SSL
• TLS	– Transport	Layer	Security
• SSL	– Secure	Sockets	Layer
• Encrypts	end-to-end	to	the	application	buffers
• Application	must	support	System	SSL
• Development	maintenance	overhead
• Cannot	work	for	UDP	services	(EE,	DNS	lookup,	SNMP...)
AT-TLS
• AT-TLS	– Application	Transparent	Transport	Layer	Security
• Encrypts	to	TCP/IP	stack	on	z/OS
• Component	of	Communications	Server
• Defined	per	application
• Removes	need	for	application	to	support	System	SSL
• IBM	recommended	solution
• Cannot	work	for	UDP	services	(EE,	DNS	lookup,	SNMP	..)
• Requires	policy	agent
IPsec
• IPsec	– Internet	Protocol	security
• Provides	an	encrypted	“tunnel”	at	IP	link	layer
• Component of	Communications	Server
• Tunnel	can	be	shared	by	multiple	applications/services
• Tunnel	can	be	used	for	TCP	and	UDP	services
• Data	can	flow	in	clear	to	application	within	datacentre
• Requires	policy	agent
IP	Filtering
• Effectively	a	firewall	for	z/OS
• Component of	Communications	Server
• Requires	policy	agent
• Configure	to	allow/reject	any	IP	packet
• You	can	use	the:
– Target/Origin	IP	address
– Target/Origin	Port
– Plus	other	metrics…
• Audit	log	written	to	SyslogD
Intrusion	Detection	Services	(IDS)
• A	hacker	detection	mechanism	for	z/OS
• Component of	Communications	Server
• Looks	for	a	wide	range	of	intrusion	attacks
– ICMP	attacks
– UDP	attacks
– Port	scans
– TCP	state	violations
– TCP	malformed	packets
– Many	more…
• Requires	policy	agent
• Audit	log	written	to	SyslogD
Intrusion	Detection	Services	(IDS)
• We	all	understand	the	business	disaster	that	is	a	data	breach	and	
the	millions	that	can	cost	an	organisation
• But	a	denial	of	service	can	cost	an	organisation	just	as	much
• What	if	one	of	your	major	competitors	hired	someone	from	the	
“Dark	Web”	to	take	down	your	systems…
• What	if	they	have	mainframe	knowledge?
• Hackers	learn	quickly	and	they	are	platform	agnostic.	As	long	as	
they	get	paid,	they	don’t	care.	Ever	heard	of	Hacking	as	a	service?
Intrusion	Detection	Services	(IDS)
SyslogD
• Given	this	is	typically	where	all	the	useful	information	is	written…
• How	many	of	us	actually	monitor	or	even	alert	on	what’s	written	in	
here?
• Borrowed	the	next	slide	from	a	comms server	manual
SyslogD
• The	syslogd facility	uses	a	
common	mechanism	for	
segregating	messages
• The	table	shows	the	facilities	
used	by	z/OS	Communications	
Server	functions	which	write	
messages	to	syslogd
• The	Primary	syslog	facility	
column	shows	the	syslog	facility	
used	for	most	messages	logged	
by	the	application
• Some	applications	use	other	
facilities	for	certain	messages
File	Transfer
• Another	key	area	is	FTP
• Obviously	the	SERVAUTH	profiles	help	to	some	extent,	but	you	
really	need	an	additional	layer	of	security	for	FTP/FTPS	which	you	
have	to	write	yourself	or	purchase	additional	software	to	get	all	
that	you	need
• How	about	sftp and	OpenSSH?
• Less	support	for	security	here	and	they	need	to	be	carefully	
considered
SMTP
• How	many	of	you	are	running	SMTP?
• How	are	you	controlling	it?
• What	would	be	the	business	and	reputational	impact	for	your	
company	if	someone	was	able	to	email	sensitive	data	from	the	
mainframe	to	the	outside	world?
• ‘Panama	Papers’	anyone?
Other	Controls
Other	Controls
• It’s	not	just	about	mainframe	security	controls
• It’s	about	your	end-to-end	security	posture
• You	need	to	work	through	what	a	well	motivated	hacker,	or	a		
disgruntled	employee	may	do
• You	need	to	start	thinking	like	them
• It’s	about	the	all	ecosystem:	mainframe,	other	platforms	and	
devices
What	about	all	the	other	stuff?
• Subsystems	(CICS,	IMS,	DB2,	MQ)
• Scheduler
• Automation
• Source	Control	and	4	eye	checking
• All	the	ISV	products	you	have…
• How	about	vulnerability	scanning:
– IBM
– ISV
– Internally	developed
Real	Life	Examples
Real	Life	Examples
• Recently	performed	a	mainframe	security	audit	at	a	financial	
institution	in	Europe	(51	risks	identified)
• Large	number	of	users	with	READ	access	to	a	daily	backup	copy	of	
the	RACF	database,	Network	controls	not	properly	protected,…
Classification Score
Critical 11
Serious 23
Important 17
Real	Life	Examples
• Mainframe	security	audit	at	a	large	energy	company	in	the	US	this	
summer	(72	risks	identified)
• Network	controls	not	defined	
• READ	access	to	sensitive	data!!
Classification Score
Critical 27
Serious 30
Important 15
Real	Life	Examples
• Security	analysis	of	a	production	RACF	DB	at	a	government	agency	
in	the	UK	last	month
• 33	security	problems	identified	in	the	RACF	DB
• SERVAUTH	class	not	active!!
• Large	number	of	users	with	ALTER	access	to	Master	Catalog
• All	OPERCMDS	profiles	in	Warning	mode	including	JES2.*	and	
MVS.*
• RACF	Databases	with	UACC	of	READ	and	several	users	with	ALTER	
and	UPDATE	access
Real	Examples
Taking	security	
seriously	(or	not)
On	a	nice	Sunday	morning…
On	its	TV	screen	facing	the	street
On	the	train	on	a	business	trip…
On	the	train	on	a	business	trip…
On	a	site,	somewhere	in	Europe…
On	a	site,	somewhere	in	Europe…
Conclusions
You	need	a	plan
1.	Security	Policy
2.	Security	
Design
3.	Security	
Procedures
4.	Security	
Implementation
5.	Security	
Auditing
6.	Measurement	
Against	Policy
It’s	a	continuous	process
Discovery
Attack
(Optionally)	
Attack	the	
system	with	
discovery	
information.	
Success?
Use	the	findings	to	your	
benefit	to	enhance	your	
security	posture.
Discover
Discover	the	flaws	
in	your	system	with	
the	knowledge	
gained.	
Education
This	and	many	
other	seesions
Knowledge
Now	you	know	
what	to	do!
Questions
Rui	Miguel	Feio
RSM	Partners	
Email:							ruif@rsmpartners.com
Mobile:				+44	(0)	7570	911459
LinkedIn: www.linkedin.com/in/rfeio
www.rsmpartners.com
Contact
IBM	z	Systems	Security	Conference	| 27-30	September	| Montpellier
IBM	Systems
46
www.ibm.com/security

Weitere ähnliche Inhalte

Was ist angesagt?

How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)Rui Miguel Feio
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Rui Miguel Feio
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Claus Cramon Houmann
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Claus Cramon Houmann
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_designNCC Group
 
The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)Rui Miguel Feio
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Rightpvanwoud
 
12 Simple Cybersecurity Rules For Your Small Business
12 Simple Cybersecurity Rules For Your Small Business 12 Simple Cybersecurity Rules For Your Small Business
12 Simple Cybersecurity Rules For Your Small Business NSUGSCIS
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Claus Cramon Houmann
 
Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3Tom King
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securitymysoria
 
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...Claus Cramon Houmann
 
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554TISA
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class ElevenFRSecure
 
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class FourFRSecure
 
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
OS Security Evolution & Latest Attack Vectors  By Jacob TorreyOS Security Evolution & Latest Attack Vectors  By Jacob Torrey
OS Security Evolution & Latest Attack Vectors By Jacob TorreyPriyanka Aash
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class TenFRSecure
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Sreejesh Madonandy
 

Was ist angesagt? (20)

How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)How to Improve RACF Performance (v0.2 - 2016)
How to Improve RACF Performance (v0.2 - 2016)
 
Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)Network and Endpoint Security v1.0 (2017)
Network and Endpoint Security v1.0 (2017)
 
Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015Keynote Information Security days Luxembourg 2015
Keynote Information Security days Luxembourg 2015
 
Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015Keynote at the Cyber Security Summit Prague 2015
Keynote at the Cyber Security Summit Prague 2015
 
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
2012 06-19 --ncc_group_-_iet_seminar_-_mobile_apps_and_secure_by_design
 
The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)The Billion Dollar Product - Online Privacy (v2.2)
The Billion Dollar Product - Online Privacy (v2.2)
 
Application Security Done Right
Application Security Done RightApplication Security Done Right
Application Security Done Right
 
12 Simple Cybersecurity Rules For Your Small Business
12 Simple Cybersecurity Rules For Your Small Business 12 Simple Cybersecurity Rules For Your Small Business
12 Simple Cybersecurity Rules For Your Small Business
 
Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2Presentation infra and_datacentrre_dialogue_v2
Presentation infra and_datacentrre_dialogue_v2
 
Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3Qualys user group presentation - vulnerability management - November 2009 v1 3
Qualys user group presentation - vulnerability management - November 2009 v1 3
 
Ccna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+securityCcna+sec+ch01+ +overview+security
Ccna+sec+ch01+ +overview+security
 
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
Thought Leader Global 2014 Amsterdam: Taking Security seriously -> Going beyo...
 
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554Top 5 myths of it security in the light of current events tisa pro talk 4 2554
Top 5 myths of it security in the light of current events tisa pro talk 4 2554
 
2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven2019 FRSecure CISSP Mentor Program: Class Eleven
2019 FRSecure CISSP Mentor Program: Class Eleven
 
2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four2019 FRSecure CISSP Mentor Program: Class Four
2019 FRSecure CISSP Mentor Program: Class Four
 
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
OS Security Evolution & Latest Attack Vectors  By Jacob TorreyOS Security Evolution & Latest Attack Vectors  By Jacob Torrey
OS Security Evolution & Latest Attack Vectors By Jacob Torrey
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
 
Security challenges in 2017
Security challenges in 2017Security challenges in 2017
Security challenges in 2017
 
Mca Erg Oct 09
Mca Erg Oct 09Mca Erg Oct 09
Mca Erg Oct 09
 
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
Even In 2014, Attackers are on steroid on Cloud, since the IT spending on Web...
 

Ähnlich wie Mainframe Security - It's not just about your ESM v2.2

IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)Rui Miguel Feio
 
2014 melbourne ims technical confernce
2014 melbourne ims technical confernce2014 melbourne ims technical confernce
2014 melbourne ims technical confernceRobert Hain
 
Agenda - IMS UG May 2014 Sydney
Agenda - IMS UG May 2014 SydneyAgenda - IMS UG May 2014 Sydney
Agenda - IMS UG May 2014 SydneyRobert Hain
 
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlAssessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlPrecisely
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinAnton Chuvakin
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best PracticesPrecisely
 
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...Obeo
 
application firewall research proposal
application firewall research proposalapplication firewall research proposal
application firewall research proposalPeter Cheung
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded SystemsAnil Kumar Pugalia
 
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...CODE BLUE
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5FRSecure
 
HelpSystems - How to Upgrade to IBM i 7.3
HelpSystems - How to Upgrade to IBM i 7.3HelpSystems - How to Upgrade to IBM i 7.3
HelpSystems - How to Upgrade to IBM i 7.3HelpSystems
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?HelpSystems
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Guang Ying Yuan
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05guestaa42e9
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testingCu Nguyen
 
Ce hv6 module 66 security convergence
Ce hv6 module 66 security convergenceCe hv6 module 66 security convergence
Ce hv6 module 66 security convergenceVi Tính Hoàng Nam
 

Ähnlich wie Mainframe Security - It's not just about your ESM v2.2 (20)

IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)IOT & BYOD – The New Security Risks (v1.1)
IOT & BYOD – The New Security Risks (v1.1)
 
2014 melbourne ims technical confernce
2014 melbourne ims technical confernce2014 melbourne ims technical confernce
2014 melbourne ims technical confernce
 
Agenda - IMS UG May 2014 Sydney
Agenda - IMS UG May 2014 SydneyAgenda - IMS UG May 2014 Sydney
Agenda - IMS UG May 2014 Sydney
 
Assessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan RiehlAssessing IBM i Security Risks: A Conversation with Dan Riehl
Assessing IBM i Security Risks: A Conversation with Dan Riehl
 
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton ChuvakinSo You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
So You Got That SIEM. NOW What Do You Do?  by Dr. Anton Chuvakin
 
IBM i Security Best Practices
IBM i Security Best PracticesIBM i Security Best Practices
IBM i Security Best Practices
 
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
Safety Architect – a Model-Based Safety Analysis Tool Benefiting from Sirius ...
 
application firewall research proposal
application firewall research proposalapplication firewall research proposal
application firewall research proposal
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
 
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
[CB19] Semzhu-Project – A self-made new world of embedded hypervisors and att...
 
Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5Slide Deck CISSP Class Session 5
Slide Deck CISSP Class Session 5
 
Lo 12
Lo 12Lo 12
Lo 12
 
BSAMMBO
BSAMMBOBSAMMBO
BSAMMBO
 
HelpSystems - How to Upgrade to IBM i 7.3
HelpSystems - How to Upgrade to IBM i 7.3HelpSystems - How to Upgrade to IBM i 7.3
HelpSystems - How to Upgrade to IBM i 7.3
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05
 
Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05Smart+Shanghai+2008 09 05
Smart+Shanghai+2008 09 05
 
Beyond security testing
Beyond security testingBeyond security testing
Beyond security testing
 
Ce hv6 module 66 security convergence
Ce hv6 module 66 security convergenceCe hv6 module 66 security convergence
Ce hv6 module 66 security convergence
 
SORT OUT YOUR SIEM
SORT OUT YOUR SIEMSORT OUT YOUR SIEM
SORT OUT YOUR SIEM
 

Mehr von Rui Miguel Feio

2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)Rui Miguel Feio
 
RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)Rui Miguel Feio
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)Rui Miguel Feio
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)Rui Miguel Feio
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Rui Miguel Feio
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Rui Miguel Feio
 
Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Rui Miguel Feio
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Rui Miguel Feio
 

Mehr von Rui Miguel Feio (9)

2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)2017 - Data Privacy and GDPR (v1.1)
2017 - Data Privacy and GDPR (v1.1)
 
RACF - The Basics (v1.2)
RACF - The Basics (v1.2)RACF - The Basics (v1.2)
RACF - The Basics (v1.2)
 
2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)2017 - Ciberseguranca v1.0 (versao em Portugues)
2017 - Ciberseguranca v1.0 (versao em Portugues)
 
2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)2017 - Cibersecurity v1.0 (English version)
2017 - Cibersecurity v1.0 (English version)
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)Cyber Crime - The New World Order (v1.0 - 2016)
Cyber Crime - The New World Order (v1.0 - 2016)
 
Cybercrime Inc. v2.2
Cybercrime Inc. v2.2Cybercrime Inc. v2.2
Cybercrime Inc. v2.2
 
Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)Challenges of Outsourcing the Mainframe (v1.2)
Challenges of Outsourcing the Mainframe (v1.2)
 
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
Implementation of RBAC and Data Classification onto a Mainframe system (v1.5)
 

Kürzlich hochgeladen

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Mainframe Security - It's not just about your ESM v2.2