SlideShare a Scribd company logo
World®
’16
In	the	Voice	of	a	Mainframe	Millennial:	
How	Can	Mainframe	Security	Be	Made	Easier?
Josh	Broadhurst,	Associate	Software	Engineer
CA	Technologies
MFT53T
MAINFRAME	AND	WORKLOAD	AUTOMATION
2 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
©	2016	CA.	All	rights	reserved.	All	trademarks	referenced	herein	belong	to	their	respective	companies.
The	content	provided	in	this CA	World	2016	presentation	is	intended	for	informational	purposes	only	and	does	not	form	any	type	of	
warranty. The information	provided	by	a	CA	partner	and/or	CA	customer	has	not	been	reviewed	for	accuracy	by	CA.	
For	Informational	Purposes	Only	
Terms	of	this	Presentation
3 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Abstract
Agile	businesses	need	to	balance	security	with	ease	of	use.	You	need	to	know	who	is	accessing	
your	data,	where	the	data	is	located	and	that	it	is	secure.	But	at	the	same	time,	authorized	users	
need	access	at	all	times	to	propel	the	business	forward.	How	can	we	our	simplify	mainframe	
security	practices	to	achieve	this	balance?	In	this	session,	a	mainframe	millennial	provides	a	
fresh	perspective	on	the	landscape	of	mainframe	security	and	provides	new	insights	on	how	we	
can	simplify	mainframe	security	practices	while	improving	our	security	and	compliance	posture.
Josh	
Broadhurst
CA	Technologies
Associate	Software	
Engineer
4 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Quick	Introduction
§ Graduated	from	UIUC
– B.S.	Computer	Engineering
§ Started	at	CA	in	January
– Associate	Software	Engineer
§ Work	at	the	Lisle,	IL	office
– CA	Data	Content	Discovery	(DCD)
About	Me
5 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Agenda
BACKGROUND	AND	CHALLENGES
ADDRESSING	INTERNAL	SECURITY	RISKS
CREATING	A	RISK-AWARE	CULTURE
PREPARING	A	YOUNGER	WORKFORCE
1
2
3
4
QUESTIONS	AND	COMMENTS5
6 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Background	and	Challenges
7 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Background	and	Challenges
§ 80%	of	Fortune	2000	companies	have	mainframe	staff	eligible	
for	retirement	
§ Management	tasks	believed	would	suffer	most	from	shortfalls	
in	mainframe	staffing:
– Security	(55%)
– Storage	(47%)
– Workload	management	(46%)
– Database	management	(26%)
Mainframe	Skills	Shortage
SOURCE:	“The	Mainframe	Conundrum:	Escalating	Workloads,	Shrinking	Staff”	by	TheInfoPro,	Inc.	(2008)
8 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Background	and	Challenges
41%
43%
50%
Password	Security
Data	Loss
Unauthorized	Access
Which	security	challenges	are	large	enterprises	
“extremely	concerned”	with?	
Enterprise	Security	Challenges
SOURCE:	Nokia	and	Penn	Schoen	Berland survey	of	1500	senior	IT	decision	makers	(2015)
9 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Background	and	Challenges
§ LPAR	on	IBM	System	z	is	EAL5	certified
§ Problem:	EAL	is	limited	to	specific	Target	of	Evaluation	(TOE)
– Only	properties	of	security	products	or	systems	considered
§ What	about	
– Administration?
– User	training?
– Compliance?
Measuring	Security
10 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Addressing	Internal	Security	Risks
11 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Addressing	Internal	Security	Risks
§ Top	two	causes	of	security	incidents	relate	to	internal	risks
Investigating	Security	Incidents
SOURCE:	“Data	Breach	Investigations	Report”	by	Verizon	(2016)	
8,886
9,630
9,701
10,490
11,347
Everything	Else
Denial-of-Service
Physical	Theft/Loss
Privilege	Misuse
Miscellaneous	Errors
12 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Addressing	Internal	Security	Risks
§ 63%	of	confirmed	breaches	involved	weak,	default,	or	
stolen	passwords
§ 26%	of	miscellaneous	error	breaches	involved	employees	
sending	sensitive	information	to	wrong	person
§ 70%	of	insider	misuse	breaches	took	months	or	years	
to	discover
Some	Useful	Figures
SOURCE:	“Data	Breach	Investigations	Report”	by	Verizon	(2016)
13 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Addressing	Internal	Security	Risks
27 6 3 2
7 1Internal
External
Discovery	methods	of	breaches	within	Miscellaneous	Errors
Customer	Report Leaked	Documents	or	Files Actor	Disclosure Audit Employee	Report IT	Review
How	Are	Breaches	Discovered?
SOURCE:	“Data	Breach	Investigations	Report”	by	Verizon	(2016)
14 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Addressing	Internal	Security	Risks
§ Employee	compliance	with	security	guidelines	is	a	major	
factor	in	security	incidents
§ Why	aren’t	employees	following	existing	security	guidelines?
§ Need	more	internal	diligence	to	identify	breaches	and	
respond	earlier	in	the	lifecycle
Root	of	the	Problem
15 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	a	Risk-Aware	Culture
16 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	a	Risk-Aware	Culture
§ Monitor	systems	and	users
– Log,	analyze,	and	report	on	security	events
– SIEM	software
§ CA	Compliance	Event	Manager
§ Know	your	data
– Where	is	sensitive	data	located?
– Who	has	access	to	it?
– DLP	software
§ CA	Data	Content	Discovery
Technical	Measures
17 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	a	Risk-Aware	Culture
§ Changing	attitudes
– People	will	follow	procedure	only	if	perceived	benefit	outweighs	cost
– Initiatives,	programs,	and	policies	often	considered	“extra	work”
– Fear	of	punishment	could	inhibit	reporting
§ Active	support	from	management
– Authorize	risk	management	costs	and	resource	allocation
– Accept	accountability	for	security	failures	and	policy	violations
– Provide	ongoing	training	to	security	team
Non-technical	Measures
18 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Creating	a	Risk-Aware	Culture
“Active	and	visible	involvement	of	top	management…not	only	
changes	the	relevant	culture	of	the	organization	but	also	
directly	influences	the	cognitive	beliefs	of	employees	which	
then	influence	their	compliance	intentions.”
Managing	Employee	Compliance	with	Information	Security	Policies:	The	Critical	Role	of	
Top	Management	and	Organizational	Culture
19 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Preparing	a	Younger	Workforce
20 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Preparing	a	Younger	Workforce
Personal	Experience
§ x86/Linux	background
– Computing	fundamentals	not	
so	different
§ Mainframe	ASE	Program
– 7	weeks	official	training
§ z/Architecture	Basics
§ TSO	and	ISPF	Panels
§ z/OS	languages
ME
21 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Preparing	a	Younger	Workforce
§ Current	offerings	focus	on	mainframe	platform	as	a	whole
§ What	about	security	practices?
§ IBM	“Enterprise	Skills	Survey”	of	130	customers	and	partners	
shows	lack	of	emphasis	on	mainframe	security	skills
What’s	Missing?
SOURCE:	IBM	Academic	Initiative,	System	z	Program,	Enterprise	Skills	Survey	Results	(2006-2009)	
Skills	Area Strongly	Required Not	Required
Security	Training 36.03% 17.30%
22 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Vulnerability	Labs
First-hand	experience	
on	various	
vulnerabilities,	attacks,	
and	countermeasures
Design	Labs
Apply	security	principles	
in	designing	and	
implementing	systems
Exploration	Labs
Enhance	student	
learning	via	
observation,	playing	
and	exploration
Preparing	a	Younger	Workforce
Case	study:	SEED
SOURCE:	“SEED:	A	suite	of	instructional	laboratories	for	computer	security	education”	by	Du,	W.	and	Wang,	R.	(2008)
23 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Preparing	a	Younger	Workforce
Case	study:	SEED
42%
52%
6%
"The	lab	sparks	my	interest	in	
computer	security"
Strongly	Agree Agree Neutral
SOURCE:	“SEED:	A	suite	of	instructional	laboratories	for	computer	security	education”	by	Du,	W.	and	Wang,	R.	(2008)	
68%
29%
3%
"The	lab	was	a	valuable	part	of	
this	course"
Strongly	Agree Agree Neutral
24 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Conclusion
Action	or	inaction	by	employees	poses	significant	risk	to	informational	assets.	Awareness	of	threats	and	the	
rationale	behind	security	controls	can	encourage	appropriate	preventive	behavior.
Information	security	is	primarily	a	management	problem.	Top	management	support	is	a	critical	factor	in	
procuring	resources	to	develop	an	effective	security	culture.
Controlled	access	to	real-world	systems	is	an	invaluable	educational	tool.	Training	for	new	employees	should	
be	designed	to	encourage	compliance	as	an	easy	and	desirable	task.
Summary
A	Few	Words	to	Review
25 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Questions?
26 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Recommended	Sessions
SESSION	# TITLE DATE/TIME
MFX173S The	Importance	of	Mainframe	Security	Education	 11/16/2016	at	3:45	pm
MFT174S
Mainframe	Security	Strategy	and	Roadmap:	Best	
Practices	for	Protecting	Mission	Essential	Data
11/17/2016	at	12:45	pm
MFT175S Gaps	in	Your	Defense:	Hacking	the	Mainframe	 11/17/2016	at	3:00	pm
27 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Must	See	Demos
Real-Time	Data	
Security	&	Compliance	
CA	Data	Content	
Discovery
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	Top	Secret®
Mainframe	Theatre
Real-Time	Data	
Security	&	Compliance	
CA	Compliance	
Event	Manager
Mainframe	Theatre
Mainframe	Security	
Smart	Bar
CA	ACF2™
Mainframe	Theatre
28 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Thank	you.
Stay	connected	at	communities.ca.com
29 ©	2016	CA.	ALL	RIGHTS	RESERVED.@CAWORLD				#CAWORLD
Mainframe	and	Workload	Automation
For	more	information	on	Mainframe	and	Workload	Automation,		
please	visit:	http://cainc.to/9GQ2JI

More Related Content

Viewers also liked

Resumen para-estudiantes-de-romeo-y-julieta
Resumen para-estudiantes-de-romeo-y-julietaResumen para-estudiantes-de-romeo-y-julieta
Resumen para-estudiantes-de-romeo-y-julieta
noelia bornia
 
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
CA Technologies
 
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
CA Technologies
 
M3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and AlertM3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and Alert
CA Technologies
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
CA Technologies
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
CA Technologies
 
Voluntary Guidelines for Sustainable Soil Management - VGSSM
Voluntary Guidelines for Sustainable Soil Management - VGSSMVoluntary Guidelines for Sustainable Soil Management - VGSSM
Voluntary Guidelines for Sustainable Soil Management - VGSSM
FAO
 
CA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and BetterCA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and Better
CA Technologies
 
Vocabulario sobre vegetación
Vocabulario sobre vegetaciónVocabulario sobre vegetación
Vocabulario sobre vegetación
IES Las Musas
 
CA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for ModernizationCA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for Modernization
CA Technologies
 
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
CA Technologies
 
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
CA Technologies
 
Hands-On Lab: Master REST APIs in CA Application Performance Management
Hands-On Lab: Master REST APIs in CA Application Performance ManagementHands-On Lab: Master REST APIs in CA Application Performance Management
Hands-On Lab: Master REST APIs in CA Application Performance Management
CA Technologies
 
Salivary gland and its secretion in mosquitoes
Salivary gland and its secretion in mosquitoesSalivary gland and its secretion in mosquitoes
Salivary gland and its secretion in mosquitoes
iswarya mohan
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
CA Technologies
 
New Product Introduction: iPad 2
New Product Introduction: iPad 2New Product Introduction: iPad 2
New Product Introduction: iPad 2staneymv
 
Climas y vegetación en España I. Clima Atlántico
Climas y vegetación en España I. Clima AtlánticoClimas y vegetación en España I. Clima Atlántico
Climas y vegetación en España I. Clima Atlántico
Alfredo García
 
Etude de cas : AXE
Etude de cas : AXEEtude de cas : AXE
Etude de cas : AXE
Léa Lescou
 

Viewers also liked (19)

Resumen para-estudiantes-de-romeo-y-julieta
Resumen para-estudiantes-de-romeo-y-julietaResumen para-estudiantes-de-romeo-y-julieta
Resumen para-estudiantes-de-romeo-y-julieta
 
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
Technology Primer: Save Money and Improve Service by Replacing "Free" Native ...
 
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...How is Buying a Home Like Justifying Data Security Investments? Developing Re...
How is Buying a Home Like Justifying Data Security Investments? Developing Re...
 
M3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and AlertM3A Services Monitor, Measure, Manage and Alert
M3A Services Monitor, Measure, Manage and Alert
 
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
Hands-On Lab: Integrate CA Service Operations Insight and CA Unified Infrastr...
 
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDashTech Talk: Predictive Workload Analytics with CA Workload Automation iDash
Tech Talk: Predictive Workload Analytics with CA Workload Automation iDash
 
Voluntary Guidelines for Sustainable Soil Management - VGSSM
Voluntary Guidelines for Sustainable Soil Management - VGSSMVoluntary Guidelines for Sustainable Soil Management - VGSSM
Voluntary Guidelines for Sustainable Soil Management - VGSSM
 
CA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and BetterCA Spectrum® Just Keeps Getting Better and Better
CA Spectrum® Just Keeps Getting Better and Better
 
Vocabulario sobre vegetación
Vocabulario sobre vegetaciónVocabulario sobre vegetación
Vocabulario sobre vegetación
 
CA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for ModernizationCA IDMS™ 19.0 SQL Enhancements for Modernization
CA IDMS™ 19.0 SQL Enhancements for Modernization
 
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...Hands-On Lab: CA Spectrum: How To Leverage UI Updates For Operational Effic...
Hands-On Lab: CA Spectrum : How To Leverage UI Updates For Operational Effic...
 
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
Hands-On Lab: CA Spectrum® 10.0 Deep Dive – 64-Bit, Network Virtualization an...
 
Hands-On Lab: Master REST APIs in CA Application Performance Management
Hands-On Lab: Master REST APIs in CA Application Performance ManagementHands-On Lab: Master REST APIs in CA Application Performance Management
Hands-On Lab: Master REST APIs in CA Application Performance Management
 
Salivary gland and its secretion in mosquitoes
Salivary gland and its secretion in mosquitoesSalivary gland and its secretion in mosquitoes
Salivary gland and its secretion in mosquitoes
 
Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps Tech Talk: Demystifying Mobile to Mainframe DevOps
Tech Talk: Demystifying Mobile to Mainframe DevOps
 
New Product Introduction: iPad 2
New Product Introduction: iPad 2New Product Introduction: iPad 2
New Product Introduction: iPad 2
 
Climas y vegetación en España I. Clima Atlántico
Climas y vegetación en España I. Clima AtlánticoClimas y vegetación en España I. Clima Atlántico
Climas y vegetación en España I. Clima Atlántico
 
le picotin
le picotinle picotin
le picotin
 
Etude de cas : AXE
Etude de cas : AXEEtude de cas : AXE
Etude de cas : AXE
 

Similar to Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security Be Made Easier?

The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
CA Technologies
 
Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe
CA Technologies
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
CA Technologies
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
 
CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
CA World - mft1755 - gaps in your defense hacking the mainframe - philip youngCA World - mft1755 - gaps in your defense hacking the mainframe - philip young
CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
Philip Young
 
Pre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational IntelligencePre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational Intelligence
CA Technologies
 
Tech Talk: Problem Prevention With Operational Intelligence
Tech Talk: Problem Prevention With Operational Intelligence Tech Talk: Problem Prevention With Operational Intelligence
Tech Talk: Problem Prevention With Operational Intelligence
CA Technologies
 
Tech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team CenterTech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team Center
CA Technologies
 
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersPre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
CA Technologies
 
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
CA Technologies
 
Delivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformDelivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS Platform
CA Technologies
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
CA Technologies
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
CA Technologies
 
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
CA Technologies
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
CA Technologies
 
Pre-Con Ed: CA API Gateway: How to Deploy Your Gateway Across Multiple Enviro...
Pre-Con Ed: CA API Gateway: How to Deploy Your Gateway Across Multiple Enviro...Pre-Con Ed: CA API Gateway: How to Deploy Your Gateway Across Multiple Enviro...
Pre-Con Ed: CA API Gateway: How to Deploy Your Gateway Across Multiple Enviro...
CA Technologies
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
CA Technologies
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
CA Technologies
 
Customer Use Case: Real-World Automation in Retail
Customer Use Case: Real-World Automation in RetailCustomer Use Case: Real-World Automation in Retail
Customer Use Case: Real-World Automation in Retail
CA Technologies
 

Similar to Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security Be Made Easier? (20)

The Importance of Mainframe Security Education
The Importance of Mainframe Security Education The Importance of Mainframe Security Education
The Importance of Mainframe Security Education
 
Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe Gaps in Your Defense: Hacking the Mainframe
Gaps in Your Defense: Hacking the Mainframe
 
Enterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to KnowEnterprise Developers, Linux and z Systems - What you Need to Know
Enterprise Developers, Linux and z Systems - What you Need to Know
 
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch PadEnabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
 
Securely Enabling the Digital Age
Securely Enabling the Digital AgeSecurely Enabling the Digital Age
Securely Enabling the Digital Age
 
CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
CA World - mft1755 - gaps in your defense hacking the mainframe - philip youngCA World - mft1755 - gaps in your defense hacking the mainframe - philip young
CA World - mft1755 - gaps in your defense hacking the mainframe - philip young
 
Pre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational IntelligencePre-Con Ed: Predicting the Fire with Operational Intelligence
Pre-Con Ed: Predicting the Fire with Operational Intelligence
 
Tech Talk: Problem Prevention With Operational Intelligence
Tech Talk: Problem Prevention With Operational Intelligence Tech Talk: Problem Prevention With Operational Intelligence
Tech Talk: Problem Prevention With Operational Intelligence
 
Tech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team CenterTech Talk: Faster Remediation With Mainframe Team Center
Tech Talk: Faster Remediation With Mainframe Team Center
 
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First RespondersPre-Con Ed: Improving Your Response to Events – Performance First Responders
Pre-Con Ed: Improving Your Response to Events – Performance First Responders
 
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
Encryption and Hashing and Keys – Oh, my! Demystifying Interoperable Encrypti...
 
Delivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS PlatformDelivering CA Workload Automation from a SaaS Platform
Delivering CA Workload Automation from a SaaS Platform
 
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
Pre-Con Ed: High Performance Masking and Test Data Generation for IMS and DB2
 
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite DeploymentStreamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
 
Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store? Pre-Con Ed: Who's minding the SSO store?
Pre-Con Ed: Who's minding the SSO store?
 
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX FeaturesImplementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
Implementation and Use of Generic VTAM Resources with Parallel SYSPLEX Features
 
Pre-Con Ed: CA API Gateway: How to Deploy Your Gateway Across Multiple Enviro...
Pre-Con Ed: CA API Gateway: How to Deploy Your Gateway Across Multiple Enviro...Pre-Con Ed: CA API Gateway: How to Deploy Your Gateway Across Multiple Enviro...
Pre-Con Ed: CA API Gateway: How to Deploy Your Gateway Across Multiple Enviro...
 
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AEPre-Con Ed: Implementing EEM with CA Workload Automation AE
Pre-Con Ed: Implementing EEM with CA Workload Automation AE
 
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
Pre-Con Ed: Where's the Data? How CA's DevTest Solutions Work Together to Lev...
 
Customer Use Case: Real-World Automation in Retail
Customer Use Case: Real-World Automation in RetailCustomer Use Case: Real-World Automation in Retail
Customer Use Case: Real-World Automation in Retail
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Tech Talk: In the Voice of a Mainframe Millennial: How Can Mainframe Security Be Made Easier?