News‎ > ‎

z/OS Administrators under Detective Controls

If you have any responsibility for the delivery of z/OS services then this will be of interest to you. It will discuss the automated detective controls required of those in manager or senior positions in system programming, security, audit or risk management.


Surveys (e.g. on the negative actions of BPO employees or contractors are often in the newspapers and internet. These highlight that "internal" users or agents represent the biggest threat to an organisation's data and services. We must believe most people are good and in any case an organisation must trust people to function - especially those in administrative roles. What is now generally accepted is that close monitoring of highly authorised administrators and users must be considered normal and not be viewed as a punishment by management or employees.


So what is it in z/OS administration that needs to be monitored and detected for review? You don't want to upset trusted employees but still want to enhance current change and security processes! We will be discussing that and more in our 1-hour webcast on Thursday 16th September at 15.00 BST (16.00 CEST).

To Register for this Webcast


To register for the webcast, email us your details ( or click on the link below and follow the "Register" instructions.


Click HERE to register.