Shifting Your Expectations on APIs: What Are Developers Looking for in 2018
Live: Hybrid Cloud: What It Is, What It Isn't, What It Will Be
The API Drawing Board: Architecting APIs That Your Developers Will Want to Use
Integrating Your System of Record with Blockchain
The Internet of Things (IoT) and You
Network Security vs. Cyber Crime! Who Will Win?
New to NetView for z/OS? How to Go from Walking to Running!
OSA-ICC: What's New and User Experiences
Pervasive Encryption: Data in Flight - z/OS Communications Server Policy Agent
z/OS Communications Server Network Security Overview
z/OS Communications Server Application Transparent TLS
z/OS Communication Server IPSec and IP Packet Filtering
Lab: Pervasive Encryption - AT-TLS Using Configuration Assistant for z/OS V2R3, Part 2 of 2
Lab: Pervasive Encryption - IPsec AT-TLS Using Configuration Assistant for z/OS V2R3, Part 1 of 2
What's New in NetView for z/OS
How can I tell how (or if) my z/OS network traffic is being encrypted? zERT to the rescue!
Live: Becoming the Professional You That You Published on Linked
The Art and Science of Technical Presentations
How to Make Your Mainframe Millennial-Friendly
Mastering Social Media -- The 2018 Edition
Do This, Not That - A Guide for Job Seekers & Job Keepers
This Title is Important and Other Presentation Hints and Tips
CA ACF2 and CA Top Secret Update: Multi-Factor Authentication, Pervasive Encryption and More!
Deconstructing DeFeNeStRaTe.C
Post Exploitation Enumeration Mainframe Hacking - Security Opener
Private Data: From Capture to Cashout
Changes are Coming! GDPR, PCI-DSS, 23 NYCRR 500 NEW YORK STATE Legislation and NIST All Pertain to the System Z - Critical Infrastructure of Your Organization!
Purposeful Ignorance is No Excuse for Plausible Deniability! Think About It!
Live: Pervasive Encryption - How Do I Make It Happen?
Digital Certificates - Real-World Usage on z/OS, Part 2 of 3
Digital Certificates - Lifecycle Management on z/OS, Part 3 of 3
Introduction to Kerberos on z/OS
The Dark Web: What's all the fuss?
Hack-Proofing Your Passwords: Why You Shouldn't Rely on Encryption Alone to Protect the Weakest Link
CICS Security for Dummies; Presented by a Dummy
Lab: Digital Certificate Authority on z/OS - PKI Services
Lab: Pervasive Encryption - Let's Encrypt Some Data Sets!
Live: Pervasive Encryption Demo: Loading Master Keys Using ICSF
Live: Pervasive Encryption Deep Dive: Enterprise Key Management
Live: Pervasive Encryption Demo: Guided Tour of Policy-Based Data Set Encryption
RACF Update: V2R3 and Multi-Factor Authentication
Exploiting the Mainframe 101
Guidelines for Managing z/OS Vulnerabilities
Security for Z – Beyond Your ESM and SIEM
The Beginning of Data Security
Digital Certificates -- How they Really Work, Part 1 of 3