GSE UK Security Working Group – Next Meeting on Thursday, 27th February 2025

The GSE UK Security Working Group are pleased to confirm that the next meeting is scheduled as follows:

DateThursday 27th February 2024, 09:00 – 17:00 GMT (Please note the time zone! The meeting is being run from the UK)
VenueThis is a hybrid meeting – you can attend in person or via Microsoft Teams   BMC Winnersh, 1020 Eskdale Road, 2nd Floor, Winnersh, RG41 5TS (click here for location map)
RegistrationClick here
CPE/CPD hoursUp to a maximum of 7 hours (full attendance required to claim maximum number of hours)

This meeting is suitable for anyone with an interest in Mainframe Security, including Mainframe Security Professionals (newbies to experienced), Cyber Security Specialists, System Programmers, Auditors and Managers. Attending this meeting will grow your professional skills and knowledge in the following areas:

  • Latest security innovations from vendors and how they help enhance security for your organisation
  • Current threats, trends, including regulatory and compliance updates to help you prioritise security and compliance efforts
  • Share problems, knowledge, best practices with working group members
  • Give feedback to vendors on their offerings, including product direction
  • Earn CPE/CPD hours to support maintenance of certifications or an education portfolio

Agenda

StartEndTopicWho
09:0010:00Welcome from our host, BMC Software  
Kickoff welcome session and presentation from our host:  
Briefing on the impending regulations that are landing post DORA – ISO20022 & PSDIII.  
Mark Banwell and Duncan Ash (BMC Software)
10:0011:00Considerations for Migrating Db2 Security to RACF  
Why convert to RACF for securing Db2? Implementing RACF offers significant security benefits by centralizing access control and ensuring that security management is handled by dedicated security professionals rather than database administrators. This session is designed for RACF administrators and security professionals looking to understand how RACF can be leveraged to secure Db2 effectively.  

We will examine the technical mechanisms that enable RACF-based security for Db2, highlighting how it aligns with enterprise security policies while maintaining—or even enhancing—existing security controls. While most security permissions will remain unchanged, we will also discuss specific cases where differences exist and what they mean for database access and administration. Attendees will gain a clear understanding of the benefits, challenges, and best practices for a smooth and secure transition to RACF for Db2 security.  
Joern Thyssen and Lou Losee (Rocket Software)
11:0011:15Coffee Break  All
11:1512:15Introduction to TLS and ATLS and some of the tools  
A short introduction to TLS and ATLS and some of the tools Colin developed.  
Colin Paice (Stromness Software Solutions)
12:1513:15Lunch Break & Networking  All
13:1514:15Snakes & SysProgs  
Take a journey from traditional RACF reporting to an innovative, open-source Python solution for mainframe data analysis. Starting with the limitations of standard RACF reporting tools like CARLA, this session explains the need for and evolution of the original pyRACF tool, now enhanced and rebranded as MFPandas. You’ll explore how MFPandas empowers mainframe professionals to parse and analyze IRRDBU00 and DCOLLECT data, uncovering powerful insights by combining dataset access details with real dataset names.  

Whether you’re familiar with RACF and z/OS datasets or new to the field, this session will guide you through practical, live examples of using Python to unlock mainframe data, providing both engineers and auditors with flexible, modern data capabilities.  
Henri Kuiper (Mainframe Society)
14:1515:15Anatomy of a z/OS Code Based Integrity Vulnerability  
The integrity of mainframe data and software is critical in fundamentally securing your business and understanding operating system integrity is a critical part of mainframe security strategies. This presentation will describe several types of integrity-based code vulnerabilities and correlate each to a sample SVC program listing. Through this process you will learn how to identify and communicate these types of code-based vulnerabilities.  

This presentation will supply a framework that will provide:  
– Security architects and systems programmers with a clear and concise definition of z/OS integrity-based code vulnerabilities.
– Knowledge necessary for security architects and systems programmers to communicate with their management clearly and concisely the risks associated with any identified z/OS integrity-based code vulnerability.
– An understanding of the associated risks and impact that a z/OS integrity-based code vulnerability can have if not mitigated.  
Ray Overby (Rocket Software)
15:1515:30Afternoon tea  All
15:3016:30Anyone got an idea?  
A short look at the IBM ideas website. How to use it and how to promote good ideas. Includes a look at some security ideas that are published.  
Lennie Dymoke-Bradshaw (Freelancer)
16:3017:00Mainframe Security Current Status and the Future  
Open discussion  
All  
17:00 End of meeting 

Note: Agenda and timings are subject to change.

Future GSE UK Security meetings for your calendar More details of our schedule, including other events from the GSE UK Region can be found here: https://www.gse.org.uk/events/

Be the first to comment

Leave a Reply

Your email address will not be published.


*


This site uses Akismet to reduce spam. Learn how your comment data is processed.