Closing the Integrity Gap in Your Mainframe
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
2017 ,
SHARE San Jose 2017
Most security professionals understand what a mainframe configuration-based vulnerability is, how to find them, and how to do risk mitigation. However, it isn't until you've done a code-based vulnerability assessment that you realize the severity of your exposures. Code-based vulnerabilities can allow your end users to bypass your mainframes intrinsic integrity controls. The mainframe depends upon system integrity to ensure the controls put in place cannot be bypassed by an end user. Join us to learn the differences between configuration and code-based vulnerabilities and how to incorporate a code-based Vulnerability Management Process into your organization's security policy.-Ray S. Overby-Key Resources, Inc.
Back to Proceedings File Library