09:30 – 10:30 | Emil Kotrc, Broadcom Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines |
10:30 – 10:45 | Break |
10:45 – 11:45 | Denis Tronin, Broadcom Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS |
Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines
Watch recording (logged in Tridex members only)
Session title: Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines
Session abstract: Db2 security exits (connection, sign on, and authorization) are critical components of the Db2 security. Do you fully understand what they do and how? Do you have customized versions? Do you want full control?
Continue reading “Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines”Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “Safeguarding Your Data: A Comprehensive Guide to Db2 for z/OS Security Exit routines”Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS
Watch recording (logged in Tridex members only)
Session title: Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS
Session abstract: Do you want to know when unauthorized access to Db2 has been attempted? Maybe learn who messed up your data?
Continue reading “Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS”Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “Who’s Knocking At the Door? Best Practices for Auditing Access to Db2 for z/OS”How to Hack Db2 for z/OS: Lessons We Can Draw From Mainframe Hackers
Registered Tridex members can also watch a recorded version of this presentation. Please make sure you’re logged in to access this protected content.
Continue reading “How to Hack Db2 for z/OS: Lessons We Can Draw From Mainframe Hackers”