June 22, 2017

Old Sturbridge Village, 1 Old Sturbridge Village Road, Sturbridge, MA 01566
Sponsored By: 
Imperva
Agenda: 
9:00
Opening Remarks
9:15
The Functional and Operational Considerations for Database Activity Monitoring vs Database Performance Monitoring on DB2 for z/OS
10:30
Break
10:45
Data Server Manager on DB2 for z/OS
12:00
Lunch
1:00
Data Masking Overview
2:15
Break
2:30
Keeping up with the Hack-dashians - Encrypting your DB2 data
3:45
Wrap Up
Abstracts and Biographies: 

 

The Functional and Operational Considerations for Database Activity Monitoring vs Database Performance Monitoring on DB2 for z/OS - Michael Figaro - Imperva

Abstract:

Most DB2 admins are familiar with Database Performance Monitoring.  Some are tasked with using Performance Monitors to gather activity data for CISOs and auditors.  However, there is a distinct difference between the functional and operational requirements for Activity vs Performance monitoring. We will explore these differences and how they affect DB2 sysprogs and DBAs.

Bio:

Michael Figaro is a Security Engineer for Imperva who specializes in database activity monitoring for z/OS.  Michael has worked in z/OS and its predecessor OSs since 1978.   This has included experience as an application programmer,  DBA (IMS and DB2) and sysprog (z/OS, CICS and DB2).   In 1985, Michael installed one of the first 61 GA installations of DB2 for z/OS and has concentrated mostly in DB2 for z/OS ever since.

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Data Server Manager on DB2 for z/OS - IBM - Saghi Amirsoleymani

Abstract:

IBM® Data Server Manager helps administer, monitor, manage, and optimize the performance of IBM data management platforms across the enterprise. Data Server Manager (DSM) was first introduced to DB2 for Linux, UNIX and Windows. This session looks at DSM and its support of DB2 for z/OS users. We’ll explore the Base Edition and how with one simple IBM DSM server installation, you can access multiple IBM data management platforms without the need to install or update any client code. 

We'll also cover some of the current DSM support in DB2 for z/OS tools and solutions. We will provide a glimpse into future directions for DSM for z/OS to extend your current investment in DB2 tools and solutions. DSM provides a complete, holistic view of database management - reducing the need for specialized skills, while lowering your total cost of ownership. Join us for the evolution of Data Server Manager: Simple, scalable and smart data management across the enterprise.

Bio:

Saghi Amirsoleymani is a WW Principal Solution Advisor at Rocket Software, where she evangelizes solutions for customers and partners on IBM technologies. Prior to joining this team, Saghi was part of the IBM DB2 z/OS technical support team and worked onsite premier support for almost 20 years. She began her career at IBM as an intern while earning her degree at the University of Southern California, and therefore is a diehard Trojans fan. Although she’s a SF Bay Area native, raised in Mountain View, Saghi has earned her nickname from friends and colleagues as Ms. Worldwide. She travels throughout the world presenting on various topics related to Data Studio, Data Server Manager, Analytics and Performance at conferences, users groups, webcasts and events. 

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Data Masking Overview - Imperva - Mike Spearns

Abstract:

Data masking is a must-have addition to your defense in depth security strategy. Most organizations replicate production data to support development, testing, training and other activities, which significantly increases data breach risk. Data masking is a technology that removes sensitive data from those production copies enabling use of copy data without the associated risk. This introduction will touch on common topics, techniques and capabilities for enterprise data masking.

Bio:

Mike Spearns has 25 years of professional information technology experience, including several years of team leadership and mentoring in the data masking sector. He has significant field expertise with Imperva Camouflage, and is listed as co-inventor on one of the company's patents related to data masking. As a Senior Technical Specialist, Mike is responsible for working with customers to implement Imperva Camouflage solutions utilizing established best practice methodology as a blueprint for success. In addition, Mike has over 15 years of data management experience working at the senior level in the telecommunications industry.
He also holds a degree in Computer Science, with a minor in Business Administration

-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Keeping up with the Hack-dashians - Encrypting your DB2 data - IBM - Howard Hirsch

Abstract:

This presentation will give an overall view of how encryption works with DB2 on z/OS. I will discuss items such as ICSF and creating keys, separation of duties, types of keys, types of encryption that can be done to protect your DB2 data.  We will discuss table and column level encryption as well as whether you can compress your currently compressed data. Lastly, we will remind you of the restrictions involving EDITPROCs and FIELDPROCs and how they relate to encrypting your DB2 data.

Bio:

Howie has been working in IT for 37 years. He has extensive experience in DB2 for z/OS and now works as a CyberSecurity specialist. He has worked almost exclusively on z/OS systems for firms in the telecommunications, finance and health care insurance industries.  He is a co-author of the IBM Redbook, DB2 9: Packages Revisited. He has been with IBM for the last 10 years, and is currently the North American technical lead for Guardium Data Activity Monitor for z/OS and Guardium Data Encryption for DB2 and IMS Databases.