Webcast | What's New in Crypto for z/OS
     
 
Webcast:
What's New in Crypto for z/OS

Mainframes remain the core of business-critical operations in most of the world's largest and most successful enterprises, including those in banking, insurance, healthcare, and retail. But as IT management will attest, there can be issues with complexity when it comes to securing critical information on the mainframes running on z/OS.

Implementing an encryption solution can be disruptive to business operations and require hundreds of lines of code to acquire and store keys and perform cryptographic operations. Adding to the complexity are the deep expertise and highly specialized knowledge needed to keep all the moving parts working. Not only that, roughly 80% of z/OS customers use CICS, yet many vendors offer no developer abstraction to make it easy to encrypt from CICS transactions.

In this webcast we'll discuss proven strategies for easily implementing data security in the z/OS environment. We'll also cover:

 
Extending the proven security and defenses of the mainframe to protect information assets against new world threat to data 
 
Pros and cons of various types of encryption and key
management
 
Achieving system interoperability with a data security platform approach  
 
Simplified key management that virtually eliminates key management issues  
 
A native z/OS encryption implementation that's easy to use with CICS or any z/OS environment 

Featured Speakers
Ted Alexander
Moderator: Ted Alexander
Sr. Consultant, The Praxium Group Inc.
Cofounder of the Praxium Group, Inc., Ted Alexander is experienced in all phases of data warehouse development including the architecture development, design, planning, review and implementation. He is an experienced data warehousing specialist within financial, government, retail, manufacturing, legal and entertainment business segments and conducts Security Audits and reviews in many different industries for different hardware platforms, working closely with DBAs, Security Information Officers, Internal Auditors and CIOs. In addition, Ted consults internationally on data warehousing, database design, client/server architectures, application design and customer relationship management. As an author he has also contributed to many industry articles and is active as a reviewer for several technical publications. An IBM Gold Consultants Group Member, Ted is part of a group of 60+ worldwide, hand-selected consultants with special access to future IBM technologies and advanced research.
Rich Skinner
Rich Skinner
Enterprise Risk, Security Executive Advisor,
CISSP, IBM
Rich has been in the security field for over 11 years and is an international speaker / publisher on the topics of enterprise information security, risk, and fraud that affect the top financial institutions and largest organizations in the world. In his role at IBM he works with C-level executives, business leaders, directors, architects, law enforcement, and government agencies as an expert advisor on security challenges. Previously he has worked for Ernst & Young in the Security Advisory Practice as well as State Farm, Caterpillar, and CNA Insurance. Rich is also a member of the Chicago US Secret Service Financial and Electronic Crimes Task Force. He has a Masters Degree in Information Security from Purdue University, CERIAS / Biometrics. He is also an avid traveler and has lived in Brazil, the Bahamas, Canada, and ran with the bulls in Pamplona, Spain in 2010.
Philip H. Smith III
Philip H. Smith III
Mainframe Architect - Voltage Security
Phil is Mainframe Architect at Voltage Security, Inc. He has spent over 30 years doing and managing enterprise software support/development, including operating system modifications, z/VM and z/OS systems management software, Linux on System z provisioning and management, performance analysis, Internet metasearch technology, and an enterprise email gateway for a Fortune 50 company that moved over a quarter million notes per day through a single system. Phil also creates technical reference books, contributes to trade journals, speaks at SHARE and local user groups, and tracks IBM evolution.
Please register here:
  •  Voltage Security news & events