Community
Search Options
Search Options
Log in
Skip to main content (Press Enter).
Sign in
Skip auxiliary navigation (Press Enter).
Security
Topic groups
IBM Security Cloud Pak for Security
IBM Security Global Forum
IBM Security Guardium
IBM Security MaaS360
IBM Security QRadar
IBM Security QRadar SOAR
IBM Security Trusteer
IBM Security Verify
IBM Security Z Security
IBM Security Skills & Learning
User groups
Events
IBM TechXchange Conference
Upcoming Security Events
IBM TechXchange Webinars
All IBM TechXchange Community Events
Participate
Gamification Program
Getting Started
Community Managers' Welcome
Post to Forum
Share a Resource
Share Your Expertise
Blogging on the Community
Connect with Security Users
All IBM TechXchange Community Users
Resources
IBM TechXchange Group
IBM Champions
IBM Cloud Support
IBM Documentation
IBM Support
IBM Support 101
IBM Technology Zone
IBM Training
Security Blogs
IBM Security Experts
Security Learning Academy
Request for Enhancements
IBM TechXchange Community Partner Program
TechXchange Conference
IBM TechXchange Conference 2024
Marketplace
Marketplace
IBM Security
Join our 16,000+ members as we work together to
overcome the toughest challenges of cybersecurity.
Start collaborating
Get 1 Month Free Access to Generative AI Fundamentals on Coursera
Skip main navigation (Press Enter).
Toggle navigation
Search Options
Security User Groups
User Group Tag Test
Webinar: Why Holistic Enterprise Data Security Requires Guardium z/OS
View Only
Group Home
Discussion
1.9K
Library
55
Blogs
91
Events
1
Members
1.3K
When:
Jul 22, 2020 from 02:00 PM to 03:00 PM (ET)
share:
When the “Tip of the Iceberg” is Not a Cliché: Why Holistic Enterprise Data Security Requires Guardium z/OS
...
It looked simple enough. The SOC team picked up a breach event triggered in the SIEM stream and all clues pointed to Bill the DB2 Admin.
Bill loves cars. He’s a gear head and he would look at cars online all day if he could. Sure, he gets his work done—he’s a pretty good admin—but this time Bill got phished on a dealer site. The bad actors got his favorite ID and PW and the troubles began.
Unfortunately, most of the real troubles were hidden and about to get much worse, much more personal for thousands of customers.
Attend this webinar
to learn:
Why are we still talking about data security? Isn’t the mainframe bulletproof?
The iceberg story: Bad actors attack from all sides especially through the data?
How does Guardium z/OS enable breach detection and forensics to identify the bad actors?
How does Guardium z/OS work in tandem with other IBM Z Secure tools to provide enterprise holistic protection?
#IBMGuardium
#zSecure
Download to Your Calendar
Contact
Jennifer Tullman-Botzer
jennifer@il.ibm.com
Security
Topic groups
IBM Security Cloud Pak for Security
IBM Security Global Forum
IBM Security Guardium
IBM Security MaaS360
IBM Security QRadar
IBM Security QRadar SOAR
IBM Security Trusteer
IBM Security Verify
IBM Security Z Security
IBM Security Skills & Learning
User groups
Events
IBM TechXchange Conference
Upcoming Security Events
IBM TechXchange Webinars
All IBM TechXchange Community Events
Participate
Gamification Program
Getting Started
Community Managers' Welcome
Post to Forum
Share a Resource
Share Your Expertise
Blogging on the Community
Connect with Security Users
All IBM TechXchange Community Users
Resources
IBM TechXchange Group
IBM Champions
IBM Cloud Support
IBM Documentation
IBM Support
IBM Support 101
IBM Technology Zone
IBM Training
Security Blogs
IBM Security Experts
Security Learning Academy
Request for Enhancements
IBM TechXchange Community Partner Program
TechXchange Conference
IBM TechXchange Conference 2024
Marketplace
Marketplace
Powered by Higher Logic