Guidelines for Managing z/OS Vulnerabilities
Project and Program:
Enterprise Data Center,
Security and Compliance
Tags:
Proceedings ,
SHARE Sacramento 2018 ,
2018
Has anyone told you that all it takes is one zero day vulnerability in the z/OS operating system layer to bypass your ESM and all that you are doing to secure your data? Learn what a z/OS operating system layer vulnerability is and why these zero day vulnerabilities can compromise your mainframe. The vulnerability could be located in z/OS, IBM Software Products, Independent Software Vendor (ISV) supplied programs, or installation-added programs. See a demo of an exploit of a trap door vulnerability and learn what you must do to meet mainframe operating system vulnerability management compliance guidelines.-Ray S. Overby-Key Resources, Inc.
Back to Proceedings File Library