17401: Securing MQ Initiated CICS Workload

Friday, August 14, 2015: 8:30 AM-9:30 AM
Oceanic 7 (Walt Disney World Dolphin )
Speaker: Lyn Elkins(IBM Corporation)
Handouts
  • Securing MQ Initiated CICS Workload (1.3 MB)
  • Every time I listen to the news I hear about a new 'hack', what's worse is that every time my CIO listens to the news he hears the same thing.  So we've not secured MQ workload on CICS as well as we should have, we know this, and the auditors are blazing a trail to our offices.  How do we go about this?  What can be, and more importantly what needs to be secured?  What IDs are used for triggering and the bridge?  What about messages at rest?  We need a plan, and we need it yesterday.

    Tracks: CICS Systems Programming, Middleware and Security and Compliance
    Share |




    See more of Project: CICS
    See more of Program: Application Architecture Development