Loading…
Venue: University clear filter
arrow_back View All Dates
Tuesday, June 10
 

10:20am EDT

F6 | So Your Auditors Really Want to Know What is Happening In a Database
Tuesday June 10, 2025 10:20am - 11:20am EDT
In these days of heightened security, it is likely that you will be asked about Db2’s audit facility, db2audit. This tool has the ability to collect a number of types of security information and this presentation will show how to configure and use db2audit. dbaudit can collect massive amounts of data but there are ways to limit the data and those techniques will be shown in the presentation.
Speakers
avatar for Paul Turpin

Paul Turpin

Group Technology Manager, Truist
Paul Turpin manages a database engineering team for a financial services company. He specializes in Db2 for LUW on large systems, along with other DBMS like PostgreSQL, Neo4j and MongoDB. He enjoys exploring new features and functionality in Db2. He has spoken at IDUG North America... Read More →
Tuesday June 10, 2025 10:20am - 11:20am EDT
University

11:30am EDT

F7 | How to Hack Db2 for z/OS – Lessons Learned from Mainframe Hackers
Tuesday June 10, 2025 11:30am - 12:30pm EDT
Mainframe is often perceived as the most secure platform in the world. However, the reality is that it is as secure as you make it. A group of well–known mainframe hackers shared their experience and lessons learned from the field. Specifically, they publicly showed the most common attack vectors for the mainframe. In this presentation, we will review their findings and see how these techniques can apply to Db2 for z/OS.
Speakers
avatar for Emil Kotrc

Emil Kotrc

Software architect, Broadcom
Emil is an experienced Principal Software Architect with a demonstrated history of working in the computer software industry. Skilled in IBM Db2, Agile Methodologies, Databases, and IBM Mainframe. Strong engineering professional with a Ph.D. focused in Mathematical engineering from... Read More →
Tuesday June 10, 2025 11:30am - 12:30pm EDT
University

2:00pm EDT

F8 | Db2 Audit and Audit Exceptions with SAP
Tuesday June 10, 2025 2:00pm - 3:00pm EDT
Prior to Db2 12.1, with Db2 audit enabled for the database using the db2audit facility, an unsustainably large amount of audit data is generated which has an impact on the general database performance, I/O, and space. This is especially true for the “execute” category of Db2 auditing. Almost all the data is generated by the SAP application and the SAP database connect user. Unfortunately, the db2audit facility provides very little in terms of application context that comes from the SAP system such as SAP logon user, reports, and so on.
On the other hand, there are SAP–level auditing functions and auditing within the SAP system which can provide application–related details.
However, auditing on SAP application level has its limits: You cannot audit statements that execute directly against the database and that come from outside the local ABAP stack.With Db2 12.1, the Db2 audit facility has been enhanced to overcome the above–mentioned limitation. Generally, the database data should only be accessed in a trusted way from the SAP application through the SAP database connect user, and all other connections to the database should be audited.
As of Db2 12.1, you can exclude auditing for connections originating from the local SAP application by the SAP connect user. This reduces the amount of audit data generated by the Db2 audit facility to something more manageable.
Speakers
avatar for Thomas Rech

Thomas Rech

Senior IT Architect - DB2 SAP Development, IBM
Thomas has been working in the Db2 area since 1996. Starting as a Db2 course instructor, he soon moved to the SAP on Db2 environment in 1997. He joined the SAP/IBM Db2 Development Team, followed by a role as technical sales consultant. He led several lighthouse projects like the first... Read More →
Tuesday June 10, 2025 2:00pm - 3:00pm EDT
University

4:30pm EDT

F9 | Modernizing your Security Posture around Db2 z/OS Data
Tuesday June 10, 2025 4:30pm - 5:30pm EDT
When we talk about Mainframe Modernization, we usually discuss DevOps, Zowe, APIs, Java, Python, etc, but how often does anyone talk about how your security posture needs to be modernized?  Many of these systems were built 30–40 years ago when it was just batch, IMS and CICS.  Now we have traffic coming in from everywhere, whether it is via APIs, distributed Db2, or other means, you need to make sure you are prepared to monitor that traffic to prevent DDoS attacks, and make sure nobody is getting at your most sensitive data.  I will discuss some of the core Db2 Security features that companies should consider using along with Data Access Monitors like Guardium.
Speakers
avatar for Greg DeBo

Greg DeBo

Principal Consultant, Team SWAMI
Greg is an experienced Database Specialist with a demonstrated history of working on Mainframe technology for 34 years in one of the largest mainframe shops in the United States. During his career his roles included Application Programming in COBOL and PL/1, IMS DBA, Db2 DBA, as well... Read More →
GC

Gayathiri Chandran

Technical Lead, IBM
Gayathiri Chandran is a Senior Software Engineer in Db2 for z/OS development at IBM Silicon Valley Laboratory. She is the technical lead for Db2 for z/OS Security and drives the strategy, design and development of security functions. She speaks on the Db2 security topics at various... Read More →
Tuesday June 10, 2025 4:30pm - 5:30pm EDT
University
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Audience
  • Subject
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -