MEETING SPONSORED BY:
Transcription
MEETING SPONSORED BY:
STLCMG Quarterly Meeting Agenda Time Track 1 Presenter(s) Track 2 Presenter(s) 8:30 9:00 Registration, Full Breakfast, and Networking 9:00 9:15 Welcome and Introductions 9:15 10:15 10:30 11:30 Identity and Access Management Security on the Mainframe Darius Terrell, IBM Julie Bergh, IBM Java Application Troubleshooting Peter Johnson, Unisys SQL Performance and Visualization Erik Ostermueller FIS A Word from our Sponsor Darius Terrell, Stan Clement - IBM 12:15 – 1:15 Lunch 1:15 – 2:15 Michael Smith, IBM 3:45 April 21, 2015 Location: 11:45 12:15 2:30 3:30 When: Application Security UniGroup 1 Premier Drive Fenton, MO 63026 Cost: $25 if paid by Friday, 4/17/15 $35 if paid by Monday, 4/20/15 $50 at the door 10 Best Practices for Security Mark de Lira, IBM Fee waived if you are out of work or a fulltime college student with ID. St Louis CMG must receive RSVP 10 days prior to meeting event Closing Remarks PARS at Ruby Tuesday's 10797 Watson Road, Sunset Hills Payment: Free Food - Free Drinks! All payments can be made through the website at: http://regions.cmg.org/regions/stl cmg/index.html MEETING SPONSORED BY: IBM For alternative payment arrangements contact: [email protected] Performance Analysis Relaxation Sessions (PARS) STLCMG will host PARS immediately after the meeting at Ruby Tuesday’s, only 2.75 miles away. Take a breather, network with other attendees, or just relax after a long day. Enjoy complimentary hors d'oeuvres and drinks. You will receive two complimentary drink tickets good for the beverage of your choice. Ruby Tuesday’s - Turn left out of Unigroup Take I-44 East. Stay in right lane and take Watson Road exit. Right at the second stoplight into Plaza. Free Food Free Drinks Email: [email protected] Future Meeting Dates: July 14, 2015 October 13, 2015 http://regions.cmg.org/regions/stlcmg/index.html ABSTRACTS AND BIO’S Darius Terrell, IBM Abstract Identity and Access Management Achieving today’s business imperatives demands technology that leverages the latest innovations to stay ahead of the competition. Lineof-business leaders are under increasing pressure to perform, and are subscribing to software solutions themselves in order to help reach their goals. Information Security staff are under increasing stress to ensure that their identity and access management solutions are able to securely provide auditable access to these solutions without degrading the end user experience. They also have to be concerned about internal and external attack vectors - particularly as the world moves toward cloud and mobile devices. Has your identity and access management solution evolved to handle today’s challenges? Bio Darius has worked as a Security Architect for 8 of his near 18 year career at IBM. Prior to his current role within Technical Sales he served as a Senior Security Architect within IBM Security Lab Services and brings extensive experience in the design & architecture of customer security solutions focusing on identity and access management. He has both established and utilized the best practices for deploying the IBM Security portfolio along with the lessons learned from customer deployments. Darius has also served within IBM as the World Wide Services Security Practice Manager responsible for building security software consulting competency for the IBM Security portfolio across the Americas, EMEA, and AP geographies. Peter Johnson, Unisys Abstract Java Application Troubleshooting Over the past 15 years the author has worked with numerous Java applications and has used a number of techniques to pinpoint issues with those applications. This paper describes a number of those techniques that the author has found to be most helpful. The paper includes such topics as solving memory issues, tuning garbage collection, and pinpointing problem areas. Bio Peter Johnson has 35 years of IT industry experience, mostly in application development. For many years he was the chief architect of a team that analyzed performance of Java applications on large-scale Intel-based machines and evaluated various open source software for enterprise readiness. He currently is a lead architect for Unisy Choreographer, a cloud-based solution. Peter is a frequent speaker at the annual CMG conference, speaking mainly on Java performance. He is also a co-author of JBoss in Action. Julie Bergh, MA CISSP ISSMP CBCP, IBM’s Lead North American z Systems Security Champion Abstract Security on the Mainframe Over the past 15 years the author has worked with numerous Java applications and has used a number of techniques to pinpoint issues with those applications. This paper describes a number of those techniques that the author has found to be most helpful. The paper includes such topics as solving memory issues, tuning garbage collection, and pinpointing problem areas. Bio Julie is IBM’s Lead North America z Systems Security Champion, has worked for IBM for the past 15 years and has many more years prior to that in the private sector. Julie is a certified IT specialist and has a Master’s Degree in Information Systems management from Webster University in St. Louis, MO. Prior to joining IBM, Julie worked at a variety of large companies (e. g., GMAC, MasterCard) where her roles ranged from programming and system programming to IT Internal Auditing and IT Management. In recent years, Julie’s efforts have been related to z System Security Migrations and Security Product Technical Sales, and as a result has broad experience engaging all levels of the customer organization from the C-Suite, to Security Management and to front line Security Analysts. Julie has experience in both customer and provider aspects of IBM’s z Systems Security, and possesses deep skills in z/OS, RACF, ACF2 and Top Secret administration. http://regions.cmg.org/regions/stlcmg/index.html Paul Ionescu, IBM Abstract Application Security Why the Application Layer is so exposed to Security Threats Famous Application Attacks of 2014 - Heartbleed and Shellshock Challenges associated with today's development environments: Cloud, DevOps, Continuous Integration Running an Application Security Program, managing your portfolio, assessing risk, what are the areas of Secure Engineering that you need to tackle Bio Paul Ionescu leads the Security Engineering and PSIRT program for the IBM Security business unit. He also manages a team of highly skilled security experts tasked with pen-testing IBM products: the Ethical Hacking Team. Since he joined IBM in 2007 he worked in several areas of the Application Security business including support, technical sales, technical enablement and development. Before taking on his current role Paul was a senior developer for the AppScan line of products and contributed to key projects and research. Paul also holds an IBM Master Inventor title for his contribution to the IBM patent base. Erik Ostermueller Abstract SQL Performance and Visualization SQL performance defects often evade detection until long after functional testing. Text based displays of SQL do a poor job of indicating which SQL anti-pattern is at fault, especially the chatty “SELECT N+1” anti-pattern. wuqiSpank is an open source graphical tracing tool that helps quickly identify repetitive SQL performance anti-patterns in any platform that uses SQL. To refactor the code, just apply a known solution to a known anti-pattern. Bio Erik Ostermueller was born and raised in St. Louis, MO, played grade school soccer at Fenton Park and went to high school at SLUH. Erik is the founder of wuqiSpank.org, a new way to visualize SQL Performance. He is the technical director at the Performance Center of Excellence at FIS, the largest Financial Services software provider in the world. He has done high-performance software tuning and other consulting for clients in Europe, Asia and North and South America. In 2012, CMG.org funded Erik's 8-city international speaking tour to present his paper, "HELP DEVELOPERS (FINALLY) FIND THEIR OWN PERFORMANCE DEFECTS". This paper won two awards at the 2011 International CMG performance conference: The J. William Mullen award and "Best Paper" award. Mark De Lira, IBM Abstract 10 Essential Practices for Security Every day, new streams of information flow into corporations. Employees, customers and contractors are all connected and now have access across a multitude of technologies. CIOs are challenged as never before with managing security and mitigating risk in this fastchanging, hyper-connected world. A different way of thinking is needed. Designed as a business approach to security, IBM has developed the 10 Essential Practices for IT Security. Covering all domains, they serve as a foundation for a mature, enterprise information security program. This presentation will provide a view into the 10 EPs as they are leveraged today at IBM for its own security program internally. Bio Mark De Lira currently serves as IBM's Security Services Leader in the Midwest. Drawing on a diverse background serving in various sales, technical and management capacities, Mark brings an experienced perspective with over 35 years in IT, and the last 20 in security. With a past in both consulting services as well as sales, Mark has in-depth knowledge of the security needs and business drivers organizations face today, and brings that unique insight when articulating solutions for his clients. http://regions.cmg.org/regions/stlcmg/index.html