Vanguard Security & Compliance 2016

Las Vegas, Nevada
Monday, November 14, 2016

Tentative Agenda

Monday, November 14, 2016
7:30 AM - 6:00PM REGISTRATION/INFORMATION DESK
PRE-CONFERENCE:
9:00 AM - 10:30 AM Basics of Mainframe Computing Boot Camp

John Hilman, Vanguard Integrity Professionals
This session is designed for individuals who are not familiar with, or have not had an opportunity to log onto a mainframe. 
During this session, we will discuss topics such as:
  • What is a Mainframe?
  • How to log onto a Mainframe
  •  Using TSO
  • Navigating ISPF
  • What is a Data Set?
  • How to Create a File
  • What is a Batch Job?
Upon completion, the attendee will have an understanding of commands in TSO, be  able to navigate in ISPF, be able to create a data set and have a basic understanding  of batch jobs. A glossary of terms will be included.

11:00 AM - 11:45 AM Attendee Orientation

CONFERENCE START:

12:00 PM - 1:00 PM Luncheon and Opening Session Keynote - The Current State of Mainframe Hacking

Philip Young, Zed Sec 390
Literally a ‘black box’ to some, the mainframe is a mainstay of processing power for the enterprise. Yet, throughout the world, teams responsible for securing these machines know almost nothing about it. Due to either a lack of maturity within cybersecurity, or the assumption these systems are ‘unhackable,’ the mainframe is oddly missing from most security discussions. This talk focuses on current known attack vectors that were either created by the speaker or by the (few) others in this space. Philip uses live, real world examples of poor operational awareness, exposures and new advances in mainframe “hacking”. Attendees will be able to operationalize their knowledge with the very tools the speaker used allowing them to begin (or force) discussions with their security teams.

1:30 PM - 2:45 PM DTS General Session - Hacking
Mark Wilson, RSM Partners Ltd
Philip Young, Zed Sec 390
John Connors, Vanguard Integrity Professionals
Brian Marshall, Vanguard Integrity Professionals


3:00 PM - 4:15 PM BTB General Session - RACF Update
Mark Nelson, IBM
In this session, we examine the new RACF features available in latest releases of z/OS, focusing on the new RACF function in z/OS z/OS V2.2. Topics that we cover include: The “read-only” auditor attribute, RRSF enhancements (dynamic main switching, unidirectional nodes), z/OS UNIX enhancements (SUPERUSER.FILESYS.DIRSRCH, FSEXEC control), password enhancements, more granular RACDCERT authority, PKI Services enhancements and more!

5:00 PM - 6:30PM Welcome Cocktail Reception

Tuesday, November 15, 2016
7:30 AM - 6:00 PM REGISTRATION/INFORMATION DESK

Tuesday, November 15, 2016 - 7:30 AM - 8:45 AM
Continental Breakfast - The Arizona Cyber Warfare Range - Learning by Destruction

Richard Larkins, Arizona Cyber Warfare Range
Learning about the darker side of Cyber Security in a controlled, mentor-rich environment allows pre and present Security Professionals to grow their careers and better protect their systems. But how can one gain this experience without blowing the training budget every year on BlackHat, DerbyCON, or instructor-led courses? The Arizona Cyber Warfare Range is the answer. This presentation will show what can happen when a couple of dedicated and slightly unbalanced individuals come together to establish the largest volunteer staffed, donation-funded Cyber Offensive and Defensive Training facility in the world.

Tuesday, November 15, 2016 - 9:00 AM - 10:15 AM
BAS01 - RACF Overview
John Hilman, Vanguard Integrity Professionals
The RACF Basic Administration track begins with an overview of RACF, explores the history of z/OS and RACF, and then discusses the components of RACF and its main functions. In this course, you will also learn how to interface with RACF.
BTB01 - Digital Certificates - Tips for Efficient and Secure Operation
Dustin Hayes, Vanguard Integrity Professionals
This session begins with a quick review of the goal for certificates, followed by how to determine the proper certificate authority and which rings to utilize. Other topics included are how to streamline creation and renewals, protect your keys, and what to do if you lose control of a private key. The class concludes with a review of some new capability which can be used to provide existing Certificate Management capabilities in a more secure manner.
CST01 - PCI 3.2 Update
Brian Marshall, Vanguard Integrity Professionals
This session will cover the latest changes in the Payment Card Industry Standards version 3.2 released in April 2016. In this session the instructor will cover the high level PCI DSS requirements, he will cover the SSL/ and early TLS exposure (POODLE) and talk about remediation. He will then cover the latest changes to PCI with a focus on changes in version 3.2.
DTS01 - The Core of Network Security on z/OS: Pagent
Tom Cosenza, IBM
This This session will review how to implement the different security features that are part of the System z/OS communication server. We will discuss how PAGENT interacts with the IP Stack, AT-TLS, IPSEC, IDS, PBR, and QOS. We will also discuss best practices on how to setup PAGENT within the typical environment. This session will be for the intermediate System Programmer that has some Network background.
ATM01 - AZCWR Cyber Warriors Hands-on
Elio Grieco, Arizona Cyber Warfare Range
Richard Larkins, Arizona Cyber Warfare Range
Brett Scott, Arizona Cyber Warfare Range

Tuesday, November 15, 2016 - 10:30 AM - 11:45 AM
BAS02 - RACF Groups
John Hilman, Vanguard Integrity Professionals
You have probably heard that a well-designed RACF group structure is the key to easy RACF administration. Okay, that sounds good but exactly how do you design a good RACF group structure? To get started, you need to understand the various ways that you can utilize RACF groups. For example, the best way to give users access to resources is to make use of what is known as a functional group. Another way to use RACF groups is to own other profiles - user profiles, resource profiles, and other group profiles. A third way to use RACF groups is to facilitate delegation of security administration. Whether you are implementing RACF yourself or are struggling to understand an existing RACF implementation, this session is for you. Upon completion, you will leave with detailed knowledge about RACF groups so that you can make effective use of the RACF group structure to facilitate security administration.
BTB02 - Remediating CICS Security - A User Experience
Sherry Courtney, Duke Energy
Has your company recently merged with another? Have you recently converted to RACF from ACF2 or Top Secret?  Are you new to an organization that hasn't cleaned up the RACF database in years? Are you now being tasked with remediating RACF/CICS security?  This class is designed to show you what you may encounter, what to expect and where to begin. It will cover considerations for determining if you need to build profiles from scratch or remediate existing profiles. How to capture SMF data to assist remediation without blowing up SMF. It will also touch on Do's and Don'ts for deciding what to remediate and what to tackle first.
CST02 - Block Chain - The Next Big Thing
Brian Marshall, Vanguard Integrity Professionals
This will be an exciting introduction to the next coming in computer technologies and how it could potentially affect organizations of all sizes and in all industries. If you have never heard of Block Chain, you will. In this class the instructor will provide an introduction to Block Chains, an explanation of how they work, will cover some of the industries exploring and using block chaining and how it could affect the IT industry into the future.
DTS02 - Proper Setup and Security of APF, LPA, LNKLST and PPT
John Hickman, Vanguard Integrity Professionals
In this session the instructors will cover the parmlib settings that affect security of z/OS and USS, and will cover the proper specifications of each and the risk of poor or incorrect settings.
ATM02 - AZCWR Cyber Warriors Hands-on
Elio Grieco, Arizona Cyber Warfare Range
Richard Larkins, Arizona Cyber Warfare Range
Brett Scott, Arizona Cyber Warfare Range

Tuesday, November 15, 2016 - 11:45 AM - 1:00 PM
LUNCH

Tuesday, November 15, 2016 - 1:15 PM - 2:30 PM
BAS03 - RACF Users

Doug Behrends, Vanguard Integrity Professionals
Each day, security administrators spend a substantial amount of time administering users of the system. Most users are what we refer to as “end users” or “general users,” and for these users we often reset their passwords and revoke and resume their ability to log on to the system. The best way to administer access to resources is to connect users to appropriate RACF groups that we refer to as “functional groups.” A few users need extraordinary privileges. For example, the SPECIAL attribute enables one to become a RACF security administrator. You will also learn the meaning of the AUDITOR and OPERATIONS attributes, and how to assign these attributes on a system-wide or delegated basis.
BTB03 - z/OS UNIX Security - Part 1
Dustin Hayes, Vanguard Integrity Professionals
Session focuses on the security needs of z/OS UNIX System Services (USS). It begins with an overview of UNIX security in general- discussing file permissions, file ownership, and Superuser functions. In addition, you will learn how RACF provides protection for UNIX files and directories. There will also be a discussion on UNIX daemons and servers. Learn how the OMVS segment should be defined in user and group profiles and look at FACILITY class profiles for USS and UNIXPRIV profiles for Superuser granularity.
CST03 - Managing 3rd Party IT Service Providers
Pat Diya, Independent Consultant/RACF Instructor
Many companies use one or more IT service providers for outsourcing some or all of their IT work.  Service organizations’ provide a broad range of services that cover everything from providing computer room space for companies who don’t want to manage their own data centers to providing fully-managed systems and everything in between.  If you use 3rd parties for these or other IT services such as hosting services, service desk support functions, offsite storage, disaster recovery, and more, then this session may be of interest to you.  As the use of service providers continues to grow, so does the complexity for managing control over a company’s data.  In this session we’ll talk about considerations of controls around providers’ services.  We’ll discuss how to effectively manage their services, contract considerations, service level management, understanding security standards & certifications such as ISO27001 and PCI DSS, considerations for auditing service providers and understanding/leveraging their external audit reports such as SOC1/SOC2/SOC3, as well as implementing monitoring controls of the service organization.
DTS03 - Mainframe Security...It's Not Just About Your ESM (RACF, ACF2 or TSS)... It's About So Much More!
Mark Wilson, RSM Partners Ltd
Let's take a look at some of the other security controls available to help us protect our mainframe systems……
What about intrusion detection?
What about TCPIP security?
What about SENDMAIL and SMTP Security?
Don’t be fooled by the non mainframe folk who say the mainframe is fine, it's behind a firewall….
Mark will discuss and encourage debate around a number of non ESM related security controls that should be/must be used to protect our mainframe systems….Think of it as peeling the onion, before we get to the ESM itself….
ATM03 - Defense in Depth Strategy for Protecting Your Most Prized Data
Carla Flores, CA Technologies
We all know that 70% of mission critical data still resides on the mainframe.   Yet, many don’t feel the need to invest in the platform to keep in the most securable platform out there.    This session will give you a defense in depth strategy to build layers around your most prized possession – the data!

Tuesday, November 15, 2016 - 2:45 PM - 4:00 PM
BAS04 - RACF Hands-on LAB - RACF Groups and Users
Doug Behrends, Vanguard Integrity Professionals
John Hilman, Vanguard Integrity Professionals
This hands-on lab session will focus on RACF group administration and defining and updating user profiles. You will be given the choice of completing the lab using RACF commands, RACF panels or Vanguard Administrator.
BTB04 - z/OS UNIX Security - Part 2
Dustin Hayes, Vanguard Integrity Professionals
Session focuses on the security needs of z/OS UNIX System Services (USS). It begins with an overview of UNIX security in general- discussing file permissions, file ownership, and Superuser functions. In addition, you will learn how RACF provides protection for UNIX files and directories. There will also be a discussion on UNIX daemons and servers. Learn how the OMVS segment should be defined in user and group profiles and look at FACILITY class profiles for USS and UNIXPRIV profiles for Superuser granularity.
CST04 - High Expectations - Our Systems are Like (or Could be Like) Airplanes
Mark Nelson, IBM
The information technology industry and the aviation industry have many common characteristics: Both are about the same age, both have enjoyed explosive growth, both serve a mix of uses, both a complex combination of people, processes and technology, and both are essential to our way of life. Can we as information security practitioners learn from the aviation industry to help us better manage our environments?
This session reviews the risk management and defect elimination processes and procedures that are common within the aviation industry and which have helped it increase the safety and reliability of aviation and explores how we can adapt them to our systems.
DTS04 - Proper Configuration and Setup of Parmlib Settings
John Hickman, Vanguard Integrity Professionals
In this session the instructors will cover the parmlib settings that affect security of z/OS and USS, and will cover the proper specifications of each and the risk of poor or incorrect settings.
ATM04 - CA ACF2 and CA Top Secret for z/OS - r16 and Multi-factor Authentication
Carla Flores, CA Technologies
John Pinkowski, CA Technologies
CA ACF2 and CA Top Secret for z/OS r16 is here! Is multi-factor authentication to the mainframe something you need?  Come to this session where we will review the latest enhancements in r16, and cover some of the r15 updates that you may have missed too.


Tuesday, November 15, 2016 - 4:15 PM - 5:30 PM
BAS05 - RACF and Dataset Protection - Part 1
John Hilman, Vanguard Integrity Professionals
You will learn how to use RACF dataset profiles to control access to MVS data sets, how to use the wild card characters in dataset profiles, and how to access levels that apply to datasets. You will also learn how RACF determines to allow or deny access to the MVS datasets.
BTB05 - Protecting JES Rescources with RACF
Tony Nix, Vanguard Integrity Professionals
Who can view and control production-sensitive, critical job output should be an audit point on every self-governance and regulatory compliance audit. Who can submit jobs to be executed in production z/OS environments and where job output can be routed and printed are additional important control points. In this session, you will learn how to use RACF to protect JES resources such as the input, held, and output queue data; submission of batch jobs; from where batch jobs can be submitted; and to where JES output can be transmitted and printed.
CST05 - The NIST Cyber Security and Risk Management Framework
Brian Marshall, Vanguard Integrity Professionals
Who This session will cover the NIST cyber security and risk management framework as well as discuss its relationship to other regulatory requirements both related to the federal government and organizational regulations.
DTS05 - Crypto 101: Meet Alice and Bob
Eysha Shirrine Powers, IBM 
Join this session for an introduction to cryptography concepts such as encryption & decryption, key distribution, hashing and digital signature generation & verification. Learn about the cryptographic capabilities available on z Systems™ including the ICSF, JCE and SystemSSL software libraries, CPACF hardware support and Crypto Express HSMs. The session will end with a short video introducing the TKE workstation.
ATM05 - Building a Risk Adaptive Security Strategy - What You Need
Al Ganley, CA Technologies
In this session, you will learn what you can be doing today to build the foundation necessary for successful implementation of the risk adaptive model for the mainframe. We will review what the Risk Adaptive Security Model is and how it is your only defense once mainframe credentials have been compromised or a malicious insider is attacking your system.



Wednesday, November 16, 2016
7:30 AM - 5:30 PM REGISTRATION/INFORMATION DESK

7:45 AM - 8:45 AM CONTINENTAL BREAKFAST

8:00 AM - 8:45 AM RACF REQUIREMENTS MEETING

Wednesday, November 16, 2016 - 9:00 AM - 10:15 AM
BAS06 - RACF and Dataset Protection - Part 2

John Hilman, Vanguard Integrity Professionals
You will learn how to use RACF dataset profiles to control access to MVS data sets, how to use the wild card characters in dataset profiles, and how to access levels that apply to datasets. You will also learn how RACF determines to allow or deny access to the MVS datasets.
BTB06 - Proper Configuration & Set-up of DB2 Security for RACF
Jim McNeill, Vanguard Integrity Professionals
The proper set-up and security controls for DB2 are essential to securing data on the mainframe. This session will cover the RACF DB2 security controls and the proper set-up of these controls to properly protect the data contained within the database.
CST06 - IoT & BYOD - The New Security Risks
Mark Wilson, RSM Partners Ltd
In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses.
In this session we will be discussing the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
DTS06 - Step-By-Step Guide to Master Key Management Using ICSF
Eysha Shirrine Powers, IBM
Attend this session to learn how to generate and load master keys using ICSF along with initializing key data sets for first-time startup. Learn how to change master keys and reencipher existing keys in a key data set. Also learn how to load and activate existing master keys and key data sets when moving to a new LPAR or setting up a disaster recovery environment.
ATM06 - ACF2, Top Secret and RACF - What's the Same and What's Different
Carla Flores, CA Technologies
Peter Roberts, Vanguard Integrity Professionals

Wednesday, November 16, 2016 - 10:30 AM - 11:45 AM
BAS07 - RACF & General Resource Protection
Doug Behrends, Vanguard Integrity Professionals
So, what is a general resource? In this session, you will learn that a general resource is any resource that is not a dataset. CICS, IMS, DB2 and UNIX System Services are just a few examples of resource managers that can use RACF to provide protection for their resources. Although RACF protection for general resources is similar to protection for data-sets, there are some unique differences. This session begins with covering the basics, then looks at specific examples of general resource classes including the CDT, STARTED and SURROGAT classes.
BTB07 - Security for IBM MQ on z/OS Using RACF
Tony Nix, Vanguard Integrity Professionals
So, While WebSphere MQ is supported on a wide variety of operating platforms, WebSphere MQ on z/OS is an important component for enterprise and inter-enterprise integration of existing applications and the many new applications that WebSphere MQ technology enables. WebSphere MQ employs security authorization to protect the message delivery mechanisms and context of the messages being exchanged, SSL for authentication and confidentiality of messages in transit, and various control points at which authorization can be performed to make the system reliable by protecting the configuration definition. WebSphere MQ on z/OS relies on the SAF interface to invoke a security manager. This session will describe the specific controls for WebSphere MQ on z/OS and their implementation using RACF as the security manager for z/OS.
CST07 - DHS & NIST Security & Audit Guidelines
Brian Marshall, Vanguard Integrity Professionals
This session will cover the latest changes in the DOD DISA STIGS 6.26 through 6.29 and will also go into detail on some of the other government standards that are applicable to our industry. The instructor will cover the NIST Risk Management Framework as well as discuss other NIST Special Publications of interest.
DTS07 - Preparing for a Security Audit? Introducing Key Tracking, Key Validity and Key Archival Using ICSF
Eysha Shirrine Powers, IBM
Join this session for an introduction to several new ICSF features. With HCR77A1, ICSF supported the ability to track cryptographic key usage within a KDS record. With HCR77B0, ICSF added callable services to read/write metadata and list KDS records. ICSF can also enforce key archiving and validity dates. Come learn more about these new features and see them in action!
ATM07 - Security Think Tank
Carla Flores, CA Technologies
Want to talk about something security related and don’t see a session on that topic?   Come to this session to collaborate with speakers, subject matter experts and peers!

Wednesday, November 16, 2016 - 11:45 AM - 1:00 PM
LUNCH

Wednesday, November 16, 2016 - 1:15 PM - 2:30 PM
BAS08 - RACF Hands-on LAB - Data Sets & General Resources

Doug Behrends, Vanguard Integrity Professionals
John Hilman, Vanguard Integrity Professionals
In this hands-on lab exercise, you will create dataset profiles for the users and groups that were defined in the previous lab. You will also be defining and updating general resource profiles such as; TSO resources and profiles for a CICS environment. Again, you will have the option of using RACF commands, RACF panels or Vanguard Administrator to complete the lab.
BTB08 - RACF Utilities for Auditors (and Friends!)
Mark Nelson, IBM
Auditors are responsible for ensuring that your information systems properly implement your installation's security policy, which includes the protect of the z/OS operating system itself. RACF provides several utilities that help auditors analyze your security environment. In this overview session, we describe how auditors and their friends (security administrators and systems programmers) can use several of these utilities to review your RACF-protected systems: The RACF health checks, the RACF Cross Reference Utility (IRRUT100), the RACF Database Unload Utility (IRRDBU00), the RACF SMF Data Unload Utility (IRRADU00), and the RACF Remove ID Utility (IRRRID00). We use the Vanguard "Top Ten Audit Findings" as a reference point to see how these utilities can be used to find common z/OS misconfigurations. Coding examples will be provided.
CST08 - Advanced Mainframe Hacking
Philip Young, Zed Sec 390
When talking with CISOs there’s one thing about mainframe security that is well understood: They are protected by ‘obsecurity’. Largely thought impenetrable, these systems are a massive blind spot when it comes to current security architecture. This talk will expand on the Key Note given by Philip Young, going in to greater detail behind the tools introduced and talked about. This talk will cover some of the tools used (Nmap, Metasploit, BIRP, CICSpwn, JtR), how they work and how you would use them in a penetration test. In addition this talk will walk through using newly released additions to these tools to attack mainframes interfaces such as tn3270, NJE and FTP. It will also walk through various data exfiltration techniques and tools available to perform privilege escalation attacks. Attendees will walk away from this talk with a better understanding of the tools and techniques available to conduct mainframe penetration testing.
DTS08 - Closing the Integrity Gap in Your Mainframe
Ray Overby, Key Resources, Inc.
Most security professionals understand what a mainframe configuration-based vulnerability is, how to find them, and how to do risk mitigation. However, it isn't until you've done a code-based vulnerability assessment that you realize the severity of your exposures. Code-based vulnerabilities can allow hackers (external or internal) to bypass your mainframes integrity controls. Your mainframe operating environment depends upon system integrity to ensure the controls put in place cannot be bypassed. Learn the differences between configuration and code-based vulnerabilities and how to incorporate a code-based Vulnerability Management Process into your organization's security policy. 
ATM08 - Discover, Protect and Monitor Your Regulated or Sensitive Data
Carla Flores, CA Technologies
Al Ganley, CA Technologies
How do you identify and manage regulated or sensitive data on the mainframe?   Do you even know where it is?   Do you have test copies of data that you don’t even know about?     Come to this session to learn how you can discover, protect and monitor PII, PHI, PCI or other regulated or sensitive data in your mainframe data stores.

Wednesday, November 16, 2016 - 2:45 PM - 4:00 PM
BAS09 - RACF Logging and Reporting
John Hilman, Vanguard Integrity Professionals
This session will teach you which logging options should be set in RACF and how to report on the security event data that has been collected. This session also explores different ways to create reports.
BTB09 - Grouping Member Class Security
Peter Roberts, Vanguard Integrity Professionals
CST09 - The Dark Web...What's All the Fuss?
Mark Wilson, RSM Partners Ltd
In this session the presenter will discuss the dark web…
What's it all about….
We will discuss things such as:
TOR -- The onion Router
Alphabay - Ebay & Amazon on steroids
Bitcoin - The currency of the dark web…...
This is quite an eye opening session for those that have never ventured
into the DARK WEB :)
DTS09 - The Seven Steps of the Intrusion Kill Chain
Brian Marshall, Vanguard Integrity Professionals
This class will cover in depth the seven steps of the intrusion kill chain while providing examples of how specific organizations who were breached failed at a given step. This class is a MUST attend for any auditor, compliance manager, CISO or anyone interested in stopping intrusions into their organizations.
ATM09 - Getting to an RBAC Model Easily
Carla Flores, CA Technologies
John Pinkowski, CA Technologies
Wouldn’t it be nice to spend less time figuring out access permissions and more time focusing on real security related items?    If you think this isn’t possible, join us as we walk thru an easy and automated way to get to role based access controls on the mainframe – heck even the enterprise!


Thursday, November 17, 2016 - Vanguard Advanced Security Solutions Day

7:30 AM - 4:30 PM REGISTRATION/INFORMATION DESK

9:00 AM - 10:15 AM
VSS01 - Maximizing Your Use of Vanguard Administrator - Part 1
Doug Behrends, Vanguard Integrity Professionals
Have you used Vanguard Administrator since it was called VRA? Do you feel like you know the ins and outs of the product well? Surprisingly, it is a general understanding that 80% of our clients use only 20% of the functionality of Vanguard Administrator. This session will teach you how to go far beyond the 20%. Has someone accidentally deleted a large number of profiles in your environment? You can be the hero and come to the rescue. Vanguard Administrator has two simple ways to accomplish this and much more in less than five minutes. Get an understanding of EXCLUDE/REBUILD and QuickGen. These are two Power User’s functions that can save huge amounts of time when needing to perform complex RACF database profile manipulations . You will learn how to clone and rename groups, including ownership, connections and access list entries; transfer users to another department; define and delete Catalog Aliases; automatically.. We’ll also cover the new VUM (Vanguard Unix Manager) function recently made available.
VSS05 - Vanguard Configuration Manager Customization and Use
Bruce Schaefer, Vanguard Integrity Professionals
A tutorial of how to use Vanguard Configuration Manager™ to collect data for VCM checks, then execute those checks and finally produce reports.
VSS09 - Vanguard Security Manager
John Connors, Vanguard Integrity Professionals
Vanguard Security Manager™ is Vanguards newest product to provide Administration, and advance security reporting for RACF system on both z/VM and z/OS.  Come see how you can manage and report across all RACF databases in your enterprise in a single solution.
VSS13 - Intrusion Management Using Vanguard Enforcer
Jim McNeill, Vanguard Integrity Professionals
Vanguard Enforcer™ provides intrusion management for the z/OS environment and its security system. Enforcer makes certain that the standards, policies, rules, and operating system settings are in force and will stay in force. This session will teach you how to install, customize and use Enforcer to manage the risk of intrusions on your systems. Specifically, some of the skills you will learn include how to set the Enforcer Baseline criteria; implement email notifications of deviations from the Baseline and how to implement Enforcer Active Alerts. If you are an Enforcer user, or are considering acquiring Enforcer, be sure to attend this session to learn how to make sure that the security policies you have worked so hard to implement remain intact and protect your critical resources.

10:30 AM - 11:45 AM
VSS02 - Maximizing Your Use of Vanguard Administrator - Part 2
Doug Behrends, Vanguard Integrity Professionals
Have you used Vanguard Administrator since it was called VRA? Do you feel like you know the ins and outs of the product well? Surprisingly, it is a general understanding that 80% of our clients use only 20% of the functionality of Vanguard Administrator. This session will teach you how to go far beyond the 20%. Has someone accidentally deleted a large number of profiles in your environment? You can be the hero and come to the rescue. Vanguard Administrator has two simple ways to accomplish this and much more in less than five minutes. Get an understanding of EXCLUDE/REBUILD and QuickGen. These are two Power User’s functions that can save huge amounts of time when needing to perform complex RACF database profile manipulations . You will learn how to clone and rename groups, including ownership, connections and access list entries; transfer users to another department; define and delete Catalog Aliases; automatically.. We’ll also cover the new VUM (Vanguard Unix Manager) function recently made available.
VSS06 - Vanguard SecurityCenter
John Hilman, Vanguard Integrity Professionals
Come find out how simple it is to administer both RACF and native DB2 security with one easy-to-use interface. Visualize your group structure like never before. Discover the ease of drag-and-drop and cut-and-paste administration. RACF profile administration is just a mouse-click away.
VSS10 - Continuous Monitoring Using Vanguard Active Alerts
John Connors, Vanguard Integrity Professionals
Vanguard Active Alerts™ is a z/OS product that continuously monitors Security events within z/OS, actively looking for system and user-specified types of security events. When one of these types of events is found, Vanguard Active Alerts sends a user-defined notification for the type of event that has occurred. This session discusses the 17 available Alerts Vanguard provides customers to meet today’s continuous monitoring requirements. This session is designed for the security administrators and auditors responsible for monitoring Security events on the mainframe.
VSS14 - Vanguard QuickGen Lab
Bruce Schaefer, Vanguard Integrity Professionals
Get real hands-on experience using Vanguard’s powerful command generation and custom reporting tool, QuickGen. Learn how it can generate commands that will perform mass changes quickly and discover how to use the QuickGen Tag Language to create custom-formatted reports and CSV files for offloading report data. QuickGen is available in Vanguard Administrator, Vanguard Advisor, Vanguard Analyzer, Vanguard Offline and Vanguard CleanUp.


1:15 PM - 2:30 PM
VSS03 - Effective Use of Vanguard Advisor - Part 1
Jim McNeill, Vanguard Integrity Professionals
If you have used Vanguard Advisor™, then youvbalready know how easy it is to produce reports of yourv SMF data. In these two sessions we will go into an indepth exploration of how to get the most value from the Advisor product. In this session, you will learn how to use masking and enhanced masking; use exception criteria; sort the columns of a report; easily select which extract file to use; use extract filtering to omit SMF records; switch between the extract file and live SMF data; select the various input source options for batch reports; tailor the report format for your needs; and use SmartLink to jump to Vanguard Administrator to edit RACF profiles. After you attend these 2 sessions you will know how to “data mine” you SMF data to truly understand what’s going on in your system.
VSS07 - Vanguard Two Factor Authentication Solutions
Dustin Hayes, Vanguard Integrity Professionals
In this session you will learn about; the types of multi-factor authentication, some of the vulnerabilities in multi-factor authentication, regulatory standards and guidelines pertaining to multi-factor authentication; and methods of achieving multi-factor authentication using Vanguard's IAM solution.
VSS11 - How to Remediate ID(*) and UACC GT Read Using Vanguard Offline
Brian Marshall, Vanguard Integrity Professionals
This class will cover a specific method to find and remove all unwanted ID(*) permissions in the RACF database without compromising the production systems and users that may currently rely on ID(*). This class will also be an introduction to the Vanguard Offline product and its capabilities, but the focus for this class will be remediation of ID(*), which can also be applied to UACCs as well.
VSS15 - "Spring Cleaning" your RACF Database with Vanguard Cleanup
Ernie Englehart, Vanguard Integrity Professionals
This session will cover how Vanguard Cleanup, a new Vanguard Security Solutions Governance, Risk and Compliance (GRC) product, can help you identify and delete constructs in RACF that no longer serve any purpose. Starting with the philosophy behind the product, we’ll walk through a number of the ISPF panels used to configure, manage, and generate reports of profiles or access list entries no longer required, as well as the commands to delete the obsolete entries in RACF.


2:45 PM - 4:00 PM
VSS04 - Effective Use of Vanguard Advisor - Part 2
Jim McNeill, Vanguard Integrity Professionals
If you have used Vanguard Advisor™, then youvbalready know how easy it is to produce reports of yourv SMF data. In these two sessions we will go into an indepth exploration of how to get the most value from the Advisor product. In this session, you will learn how to use masking and enhanced masking; use exception criteria; sort the columns of a report; easily select which extract file to use; use extract filtering to omit SMF records; switch between the extract file and live SMF data; select the various input source options for batch reports; tailor the report format for your needs; and use SmartLink to jump to Vanguard Administrator to edit RACF profiles. After you attend these 2 sessions you will know how to “data mine” you SMF data to truly understand what’s going on in your system. 
VSS08 - Vanguard Cloud Authentication Solutions
John Connors, Vanguard Integrity Professionals
An introduction to how to control your Cloud based Authentications from within  your organization. Vanguard Authenticator can control such cloud based offerings as Google Mail, Salesforce, etc. redirecting cloud based authentication and control back inside your enterprise. 
VSS12 - Compliance with PCI Standards Using Vanguard Products
Peter Roberts, Vanguard Integrity Professionals
If you are subject to the PCI DSS requirements (All entities that are involved in payment card processing) then this session will give background and describe some of the challenges in implementing PCI DSS in a z/OS environment. In addition the session will show which Vanguard modules can help you meet these compliance requirements.
VSS16 - Vanguard Cleanup Lab
Doug Behrends, Vanguard Integrity Professionals
Ernie Englehart, Vanguard Integrity Professional
This session provides an opportunity for some hands-on use of Vanguard Cleanup. Attendees will gain first-hand experience using Vanguard Cleanup to generate the reports that will identify the constructs in RACF that are no longer needed and execute the commands that will delete the obsolete definitions in RACF.

Select registrant type:
VSC 2016 Attendee
 

Contact Information

Payment Instructions

  • Contact Vanguard to pay by check or use your educational credits!
    conference@go2vanguard.com
    Credit card payments and Purchase Orders may be entered online during the checkout portion of your registration.

    Now live on a mobile device near you!

    Register for details!


Media Sponsor


© 2005 - 2016 VANGUARD INTEGRITY PROFESSIONALS - NEVADA ALL RIGHTS RESERVED.
 Vanguard Security & Compliance is conducted by Vanguard Integrity Professionals, Inc. conference dates, times, schedules, topics, tracks, sessions and prices are subject to change. Vanguard Security & Compliance, is a trademark of Vanguard Integrity Professionals - Nevada.  All trademarks are the properties of their respective owners.
© 2017
Quick, easy and affordable online event registration and event management software for all event sizes.