Thursday, August 13, 2015: 11:15 AM-12:15 PM
Southern Hemisphere 2 (Walt Disney World Dolphin )
Speaker:
Leigh Compton(IBM Corporation)
Once upon a time, it was easy to secure a CICS system. Users accessed CICS from terminals directly connected to the mainframe or on dedicated leased circuits. But consider today's CICS. Many users access CICS across the Internet. Yeah, the global backbone network now brings traffic to our CICS systems. Have you updated the security for your z/OS system and for CICS? This session will survey potential entry points for an unauthorized user and the security mechanisms to close that door. The speaker will also highlight security enhancements recently delivered for CICS.
Tracks: CICS Systems Programming, Security and Compliance and Security in the Enterprise