Welcome to the IBM TechXchange Community, a place to collaborate, share knowledge, & support one another in everyday challenges. Connect with your fellow members through forums, blogs, files, & face-to-face networking.
IBM Security Join our 15,000+ members as we work together to overcome the toughest challenges of cybersecurity. Join the Community
SummaryGathering, collecting, analyzing and integrating the necessary information can be a stressful, time-consuming, complex and costly process. It is often a challenge to implement a repeatable, sustainable and automated process for enterprise wide event analysis, threat detection, auditing, compliance and reporting.zSecure Audit and Alert solution designed to help security personnel automatically collect, format and send enriched SMF records and real time alerts to a SIEM solution.This session will discuss typical use cases like: Privileged user actions - Privileged users can be someone with elevated privileges such as a z/OS systems programmer, or even a bank teller that can approve a special transaction. Security changes to their mainframe security product (e.g., RACF, CA ACF2, CA Top Secret). Changes to system software and/or configuration changes. Access attempts to resources where any user was denied that access.Key Speakers
Julie Bergh - Americas zSecurity Technical LeadJulie comes from a long career on the front lines of cybersecurity practice as CISO, Architect, Consultant, Specialist and Audit Director. And during her career, she has regularly shared her accredited expertise in all things Z Security.#Featured-area-3#Featured-area-3-home