Securing MQ Initiated CICS Workload
				Project and Program: 
Application Architecture Development and Integration, 
CICS
				Tags: 
Proceedings, 
SHARE in Orlando 2015, 
2015
		
		
		
			
		Every time I listen to the news I hear about a new 'hack', what's worse is that every time my CIO listens to the news he hears the same thing.  So we've not secured MQ workload on CICS as well as we should have, we know this, and the auditors are blazing a trail to our offices.  How do we go about this?  What can be, and more importantly what needs to be secured?  What IDs are used for triggering and the bridge?  What about messages at rest?  We need a plan, and we need it yesterday.-Lyn Elkins-IBM Corporation
		
		
		
		
		
		
	
 Back to Proceedings File Library