09:30 – 10:30 | Emil Kotrc, Broadcom Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines |
10:30 – 10:45 | Break |
10:45 – 11:45 | Denis Tronin, Broadcom Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS |
Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines
Download PDF
Watch recording (logged in Tridex members only)
Session title: Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines
Session abstract: Db2 security exits (connection, sign on, and authorization) are critical components of the Db2 security. Do you fully understand what they do and how? Do you have customized versions? Do you want full control?
Continue reading “Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines”Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS
Watch recording (logged in Tridex members only)
Session title: Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS
Session abstract: Do you want to know when unauthorized access to Db2 has been attempted? Maybe learn who messed up your data?
Continue reading “Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS”