Session Evaluation

For decades, boundary or perimeter security was seen to suffice within enterprise security. Not anymore - Zero Trust is here! CICS TS 6 introduces Security Discovery, a tooling with a purpose of building a picture of the users and security being used within your current environments. In this presentation we will show how Resource Security is integral to a Zero Trust security strategy within enterprise security and why Security Discovery is a necessity to getting your CICS environments conforming with it.