Data Set Encryption - Just Do It
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Virtual 2020 ,
2020
Greg & Julie will talk about the planning and steps for implementing data set encryption on z/OS.
We will discuss the steps that you need to execute as you implement data set encryption in your environment, and we'll zero in on the ones that are the most critical: securing the resources that protect your data and key management!-Julie A. Bergh-Rocket Software; Greg Boyd-Mainframe Crypto
Back to Proceedings File Library