Summary
Protect your most valuable assets with zSecure command verifier! This is a product that’s main objective is to validate and authenticate commands entered into your mainframe environment. You have the power to define whatever policies and procedures occur when incorrect commands are entered, so join us in how to even further utilization of RACF!
- Keeps a log of commands entered to help enhance audit capabilities and remediation.
- Eliminates the need to design, code, and maintain this homegrown process.
- A more granular RACF command access, which will reduce the risk associated with accidental action of privileged users.
Key Speakers
Julie Bergh - Americas zSecurity Technical Lead
Julie comes from a long career on the front lines of cybersecurity practice as CISO, Architect, Consultant, Specialist and Audit Director. And during her career, she has regularly shared her accredited expertise in all things Z Security.
Joseph Kiss - Brand Technical Specialist, System Z
Joseph brings a fresh point-of-view to the world of Z cybersecurity. Everyday, he’s on the front line working with our mainframe clients, helping remove obstacles to security optimization, and bringing back requirements for new feature design and development.
Kalvin Kerns - z-MLC Specialist
Kalvin brings a unique perspective to the field of cybersecurity, combining technical knowledge with a knack for effective communication. He brings informative presentations that empower organizations brings a unique perspective to the field of cybersecurity, combining technical knowledge with a knack for effective communication.
#IBMTechXchangeWebinars