際際滷shows by User: rmfeio / http://www.slideshare.net/images/logo.gif 際際滷shows by User: rmfeio / Mon, 25 Mar 2019 17:19:55 GMT 際際滷Share feed for 際際滷shows by User: rmfeio (2019) Hack All the Way Through From Fridge to Mainframe (v0.2) /slideshow/2019-hack-all-the-way-through-from-fridge-to-mainframe-v02/138115573 2019-hackallthewaythroughfromfridgetomainframev0-190325171955
Have you ever thought the perils of smart home devices? In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe. ]]>

Have you ever thought the perils of smart home devices? In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe. ]]>
Mon, 25 Mar 2019 17:19:55 GMT /slideshow/2019-hack-all-the-way-through-from-fridge-to-mainframe-v02/138115573 rmfeio@slideshare.net(rmfeio) (2019) Hack All the Way Through From Fridge to Mainframe (v0.2) rmfeio Have you ever thought the perils of smart home devices? In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2019-hackallthewaythroughfromfridgetomainframev0-190325171955-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Have you ever thought the perils of smart home devices? In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
(2019) Hack All the Way Through From Fridge to Mainframe (v0.2) from Rui Miguel Feio
]]>
650 4 https://cdn.slidesharecdn.com/ss_thumbnails/2019-hackallthewaythroughfromfridgetomainframev0-190325171955-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
(2017) GDPR What Does It Mean For The Mainframe v0.2 /slideshow/2017-gdpr-what-does-it-mean-for-the-mainframe-v02/83047197 2017-gdprwhatdoesitmeanforthemainframev0-171130105602
In this session Rui will explain what the General Data Protection Regulation (GDPR) is and what the implications are for the mainframe. Get your mainframe ready and compliant with the GDPR before it comes to effect on May 25th, 2018.]]>

In this session Rui will explain what the General Data Protection Regulation (GDPR) is and what the implications are for the mainframe. Get your mainframe ready and compliant with the GDPR before it comes to effect on May 25th, 2018.]]>
Thu, 30 Nov 2017 10:56:02 GMT /slideshow/2017-gdpr-what-does-it-mean-for-the-mainframe-v02/83047197 rmfeio@slideshare.net(rmfeio) (2017) GDPR What Does It Mean For The Mainframe v0.2 rmfeio In this session Rui will explain what the General Data Protection Regulation (GDPR) is and what the implications are for the mainframe. Get your mainframe ready and compliant with the GDPR before it comes to effect on May 25th, 2018. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2017-gdprwhatdoesitmeanforthemainframev0-171130105602-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this session Rui will explain what the General Data Protection Regulation (GDPR) is and what the implications are for the mainframe. Get your mainframe ready and compliant with the GDPR before it comes to effect on May 25th, 2018.
(2017) GDPR What Does It Mean For The Mainframe v0.2 from Rui Miguel Feio
]]>
756 3 https://cdn.slidesharecdn.com/ss_thumbnails/2017-gdprwhatdoesitmeanforthemainframev0-171130105602-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
(2017) Cybercrime, Inc. (v3.2) /rmfeio/2017-cybercrime-inc-v32 2017-cybercrimeinc-170718134439
This presentation shows how technology evolution has allowed syndicate criminals to becomeorganised criminal corporations. How the evolution of hackingand the cyber world is putting our society at risk. ]]>

This presentation shows how technology evolution has allowed syndicate criminals to becomeorganised criminal corporations. How the evolution of hackingand the cyber world is putting our society at risk. ]]>
Tue, 18 Jul 2017 13:44:39 GMT /rmfeio/2017-cybercrime-inc-v32 rmfeio@slideshare.net(rmfeio) (2017) Cybercrime, Inc. (v3.2) rmfeio This presentation shows how technology evolution has allowed syndicate criminals to becomeorganised criminal corporations. How the evolution of hackingand the cyber world is putting our society at risk. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2017-cybercrimeinc-170718134439-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation shows how technology evolution has allowed syndicate criminals to becomeorganised criminal corporations. How the evolution of hackingand the cyber world is putting our society at risk.
(2017) Cybercrime, Inc. (v3.2) from Rui Miguel Feio
]]>
428 11 https://cdn.slidesharecdn.com/ss_thumbnails/2017-cybercrimeinc-170718134439-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2 /slideshow/2017-a-new-look-at-mainframe-hacking-and-penetration-testing-v22/77352182 2017-anewlookatmainframehackingandpenetrationtestingv2-170628214403
What tools are out there today? How do these tool impact us? What's the state of mainframe security? How do we keep up to date? How do we protect ourselves? What are IBM and the vendors doing to help us?]]>

What tools are out there today? How do these tool impact us? What's the state of mainframe security? How do we keep up to date? How do we protect ourselves? What are IBM and the vendors doing to help us?]]>
Wed, 28 Jun 2017 21:44:02 GMT /slideshow/2017-a-new-look-at-mainframe-hacking-and-penetration-testing-v22/77352182 rmfeio@slideshare.net(rmfeio) 2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2 rmfeio What tools are out there today? How do these tool impact us? What's the state of mainframe security? How do we keep up to date? How do we protect ourselves? What are IBM and the vendors doing to help us? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2017-anewlookatmainframehackingandpenetrationtestingv2-170628214403-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What tools are out there today? How do these tool impact us? What&#39;s the state of mainframe security? How do we keep up to date? How do we protect ourselves? What are IBM and the vendors doing to help us?
2017 - A New Look at Mainframe Hacking and Penetration Testing v2.2 from Rui Miguel Feio
]]>
2043 6 https://cdn.slidesharecdn.com/ss_thumbnails/2017-anewlookatmainframehackingandpenetrationtestingv2-170628214403-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2017 - Data Privacy and GDPR (v1.1) /slideshow/2017-data-privacy-and-gdpr-v11/77182760 dataprivacyandgdprv1-170622170848
The challenges of Data Privacy for a company will now become even more relevant with the implementation of the General Data Protection Regulation (GDPR). Are you ready for it? What should you do? What should you consider? ]]>

The challenges of Data Privacy for a company will now become even more relevant with the implementation of the General Data Protection Regulation (GDPR). Are you ready for it? What should you do? What should you consider? ]]>
Thu, 22 Jun 2017 17:08:48 GMT /slideshow/2017-data-privacy-and-gdpr-v11/77182760 rmfeio@slideshare.net(rmfeio) 2017 - Data Privacy and GDPR (v1.1) rmfeio The challenges of Data Privacy for a company will now become even more relevant with the implementation of the General Data Protection Regulation (GDPR). Are you ready for it? What should you do? What should you consider? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dataprivacyandgdprv1-170622170848-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The challenges of Data Privacy for a company will now become even more relevant with the implementation of the General Data Protection Regulation (GDPR). Are you ready for it? What should you do? What should you consider?
2017 - Data Privacy and GDPR (v1.1) from Rui Miguel Feio
]]>
462 3 https://cdn.slidesharecdn.com/ss_thumbnails/dataprivacyandgdprv1-170622170848-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Network and Endpoint Security v1.0 (2017) /slideshow/network-and-endpoint-security-v10-2017/74706281 networkandendpointsecurityv1-170408075129
This presentation covers the challenges and potential risks each device connected to a corporate network creates. It provides some of the recommended security approaches an organisation should comply with and the processes they should follow. ]]>

This presentation covers the challenges and potential risks each device connected to a corporate network creates. It provides some of the recommended security approaches an organisation should comply with and the processes they should follow. ]]>
Sat, 08 Apr 2017 07:51:29 GMT /slideshow/network-and-endpoint-security-v10-2017/74706281 rmfeio@slideshare.net(rmfeio) Network and Endpoint Security v1.0 (2017) rmfeio This presentation covers the challenges and potential risks each device connected to a corporate network creates. It provides some of the recommended security approaches an organisation should comply with and the processes they should follow. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/networkandendpointsecurityv1-170408075129-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation covers the challenges and potential risks each device connected to a corporate network creates. It provides some of the recommended security approaches an organisation should comply with and the processes they should follow.
Network and Endpoint Security v1.0 (2017) from Rui Miguel Feio
]]>
1518 4 https://cdn.slidesharecdn.com/ss_thumbnails/networkandendpointsecurityv1-170408075129-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
RACF - The Basics (v1.2) /slideshow/racf-the-basics-v12/70966641 racfbasicsv1-170112223958
In this presentation Rui will explain what is RACF, what are its components, and how to implement security profiles in the mainframe z/OS system.]]>

In this presentation Rui will explain what is RACF, what are its components, and how to implement security profiles in the mainframe z/OS system.]]>
Thu, 12 Jan 2017 22:39:58 GMT /slideshow/racf-the-basics-v12/70966641 rmfeio@slideshare.net(rmfeio) RACF - The Basics (v1.2) rmfeio In this presentation Rui will explain what is RACF, what are its components, and how to implement security profiles in the mainframe z/OS system. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/racfbasicsv1-170112223958-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation Rui will explain what is RACF, what are its components, and how to implement security profiles in the mainframe z/OS system.
RACF - The Basics (v1.2) from Rui Miguel Feio
]]>
8384 9 https://cdn.slidesharecdn.com/ss_thumbnails/racfbasicsv1-170112223958-thumbnail.jpg?width=120&height=120&fit=bounds presentation 000000 http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2017 - Ciberseguranca v1.0 (versao em Portugues) https://pt.slideshare.net/slideshow/2017-ciberseguranca-v10-versao-em-portugues/70834843 2017-cibersegurancav1-170109201903
Nesta sess達o, o Rui discutir叩 a import但ncia e relev但ncia da ciberseguran巽a no mundo moderno. Da evolu巽達o do mundo on-line, privacidade de dados e organiza巽探es criminosas. A Internet; o mundo "on-line" que pode derrubar indiv鱈duos, empresas e at辿 na巽探es. Uma abordagem divertida dos perigos online eo que fazer para evit叩-los.]]>

Nesta sess達o, o Rui discutir叩 a import但ncia e relev但ncia da ciberseguran巽a no mundo moderno. Da evolu巽達o do mundo on-line, privacidade de dados e organiza巽探es criminosas. A Internet; o mundo "on-line" que pode derrubar indiv鱈duos, empresas e at辿 na巽探es. Uma abordagem divertida dos perigos online eo que fazer para evit叩-los.]]>
Mon, 09 Jan 2017 20:19:03 GMT https://pt.slideshare.net/slideshow/2017-ciberseguranca-v10-versao-em-portugues/70834843 rmfeio@slideshare.net(rmfeio) 2017 - Ciberseguranca v1.0 (versao em Portugues) rmfeio Nesta sess達o, o Rui discutir叩 a import但ncia e relev但ncia da ciberseguran巽a no mundo moderno. Da evolu巽達o do mundo on-line, privacidade de dados e organiza巽探es criminosas. A Internet; o mundo "on-line" que pode derrubar indiv鱈duos, empresas e at辿 na巽探es. Uma abordagem divertida dos perigos online eo que fazer para evit叩-los. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2017-cibersegurancav1-170109201903-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Nesta sess達o, o Rui discutir叩 a import但ncia e relev但ncia da ciberseguran巽a no mundo moderno. Da evolu巽達o do mundo on-line, privacidade de dados e organiza巽探es criminosas. A Internet; o mundo &quot;on-line&quot; que pode derrubar indiv鱈duos, empresas e at辿 na巽探es. Uma abordagem divertida dos perigos online eo que fazer para evit叩-los.
from Rui Miguel Feio
]]>
518 4 https://cdn.slidesharecdn.com/ss_thumbnails/2017-cibersegurancav1-170109201903-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
2017 - Cibersecurity v1.0 (English version) /slideshow/2017-ciberseguranca-v10-english-version/70834105 2017-cibersegurancav1-170109195628
In this session Rui will discuss the importance and relevance of cibersecurity in the modern world. From the evolution of the online world, to data privacy and criminal organisations. The internet; the "online" world that can bring down individuals, companies, and even nation states. An entertaining approach of the online dangers and what to do to avoid them.]]>

In this session Rui will discuss the importance and relevance of cibersecurity in the modern world. From the evolution of the online world, to data privacy and criminal organisations. The internet; the "online" world that can bring down individuals, companies, and even nation states. An entertaining approach of the online dangers and what to do to avoid them.]]>
Mon, 09 Jan 2017 19:56:28 GMT /slideshow/2017-ciberseguranca-v10-english-version/70834105 rmfeio@slideshare.net(rmfeio) 2017 - Cibersecurity v1.0 (English version) rmfeio In this session Rui will discuss the importance and relevance of cibersecurity in the modern world. From the evolution of the online world, to data privacy and criminal organisations. The internet; the "online" world that can bring down individuals, companies, and even nation states. An entertaining approach of the online dangers and what to do to avoid them. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2017-cibersegurancav1-170109195628-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this session Rui will discuss the importance and relevance of cibersecurity in the modern world. From the evolution of the online world, to data privacy and criminal organisations. The internet; the &quot;online&quot; world that can bring down individuals, companies, and even nation states. An entertaining approach of the online dangers and what to do to avoid them.
2017 - Cibersecurity v1.0 (English version) from Rui Miguel Feio
]]>
822 5 https://cdn.slidesharecdn.com/ss_thumbnails/2017-cibersegurancav1-170109195628-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Tackling the cyber security threat (2016 - v1.0) /slideshow/tackling-the-cyber-security-threat-2016-v10-69498231/69498231 2016-tacklingthecybersecuritythreatv1-161124150911
Every day new businesses create their presence online. The internet can be the best way of marketing a product or service and generate new leads and income. But the risks are immense. Every day, hackers compromise websites and get hold of confidential data. When this happens, this can mean the end of your business. What can you do to prevent this from happening? ]]>

Every day new businesses create their presence online. The internet can be the best way of marketing a product or service and generate new leads and income. But the risks are immense. Every day, hackers compromise websites and get hold of confidential data. When this happens, this can mean the end of your business. What can you do to prevent this from happening? ]]>
Thu, 24 Nov 2016 15:09:11 GMT /slideshow/tackling-the-cyber-security-threat-2016-v10-69498231/69498231 rmfeio@slideshare.net(rmfeio) Tackling the cyber security threat (2016 - v1.0) rmfeio Every day new businesses create their presence online. The internet can be the best way of marketing a product or service and generate new leads and income. But the risks are immense. Every day, hackers compromise websites and get hold of confidential data. When this happens, this can mean the end of your business. What can you do to prevent this from happening? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016-tacklingthecybersecuritythreatv1-161124150911-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Every day new businesses create their presence online. The internet can be the best way of marketing a product or service and generate new leads and income. But the risks are immense. Every day, hackers compromise websites and get hold of confidential data. When this happens, this can mean the end of your business. What can you do to prevent this from happening?
Tackling the cyber security threat (2016 - v1.0) from Rui Miguel Feio
]]>
487 2 https://cdn.slidesharecdn.com/ss_thumbnails/2016-tacklingthecybersecuritythreatv1-161124150911-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Crime - The New World Order (v1.0 - 2016) /rmfeio/cyber-crime-the-new-world-order-v10-2016 2016gse-cybercrime-thenewworldorderv1-161118120032
In this session Rui Miguel Feio will discuss how cyber crime is affecting nations, companies and individuals, and how its compromising our world and modern society. The speaker will address how hackers, criminal organisations, and nation states, are drawing a new world order where criminality flourishes in the dark web and everyone and everything is a target, and how personal data is worth billions.]]>

In this session Rui Miguel Feio will discuss how cyber crime is affecting nations, companies and individuals, and how its compromising our world and modern society. The speaker will address how hackers, criminal organisations, and nation states, are drawing a new world order where criminality flourishes in the dark web and everyone and everything is a target, and how personal data is worth billions.]]>
Fri, 18 Nov 2016 12:00:31 GMT /rmfeio/cyber-crime-the-new-world-order-v10-2016 rmfeio@slideshare.net(rmfeio) Cyber Crime - The New World Order (v1.0 - 2016) rmfeio In this session Rui Miguel Feio will discuss how cyber crime is affecting nations, companies and individuals, and how its compromising our world and modern society. The speaker will address how hackers, criminal organisations, and nation states, are drawing a new world order where criminality flourishes in the dark web and everyone and everything is a target, and how personal data is worth billions. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016gse-cybercrime-thenewworldorderv1-161118120032-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this session Rui Miguel Feio will discuss how cyber crime is affecting nations, companies and individuals, and how its compromising our world and modern society. The speaker will address how hackers, criminal organisations, and nation states, are drawing a new world order where criminality flourishes in the dark web and everyone and everything is a target, and how personal data is worth billions.
Cyber Crime - The New World Order (v1.0 - 2016) from Rui Miguel Feio
]]>
735 11 https://cdn.slidesharecdn.com/ss_thumbnails/2016gse-cybercrime-thenewworldorderv1-161118120032-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security Audit on the Mainframe (v1.0 - 2016) /slideshow/security-audit-on-the-mainframe-v10-2016/69246186 2016gse-securityauditonthemainframev1-161118115230
In this session Rui Miguel Feio will draw on his experience as a mainframe security expert to advise on how to perform a security audit on the mainframe. Rui will address what to consider before, during and after a security audit and the value and importance a company can expect from it.]]>

In this session Rui Miguel Feio will draw on his experience as a mainframe security expert to advise on how to perform a security audit on the mainframe. Rui will address what to consider before, during and after a security audit and the value and importance a company can expect from it.]]>
Fri, 18 Nov 2016 11:52:30 GMT /slideshow/security-audit-on-the-mainframe-v10-2016/69246186 rmfeio@slideshare.net(rmfeio) Security Audit on the Mainframe (v1.0 - 2016) rmfeio In this session Rui Miguel Feio will draw on his experience as a mainframe security expert to advise on how to perform a security audit on the mainframe. Rui will address what to consider before, during and after a security audit and the value and importance a company can expect from it. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016gse-securityauditonthemainframev1-161118115230-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this session Rui Miguel Feio will draw on his experience as a mainframe security expert to advise on how to perform a security audit on the mainframe. Rui will address what to consider before, during and after a security audit and the value and importance a company can expect from it.
Security Audit on the Mainframe (v1.0 - 2016) from Rui Miguel Feio
]]>
931 5 https://cdn.slidesharecdn.com/ss_thumbnails/2016gse-securityauditonthemainframev1-161118115230-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Improve RACF Performance (v0.2 - 2016) /slideshow/how-to-improve-racf-performance-v02-2016/68082252 2016gse-howtoimproveracfperformancewnv0-161102214953
When hundreds and some times thousands of security validations occur every minute on the mainframe, performance and availability are paramount. In this session the presenter shows some different techniques that when implemented can help improve RACF performance, so that it does not become the source of your performance problems.]]>

When hundreds and some times thousands of security validations occur every minute on the mainframe, performance and availability are paramount. In this session the presenter shows some different techniques that when implemented can help improve RACF performance, so that it does not become the source of your performance problems.]]>
Wed, 02 Nov 2016 21:49:53 GMT /slideshow/how-to-improve-racf-performance-v02-2016/68082252 rmfeio@slideshare.net(rmfeio) How to Improve RACF Performance (v0.2 - 2016) rmfeio When hundreds and some times thousands of security validations occur every minute on the mainframe, performance and availability are paramount. In this session the presenter shows some different techniques that when implemented can help improve RACF performance, so that it does not become the source of your performance problems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016gse-howtoimproveracfperformancewnv0-161102214953-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> When hundreds and some times thousands of security validations occur every minute on the mainframe, performance and availability are paramount. In this session the presenter shows some different techniques that when implemented can help improve RACF performance, so that it does not become the source of your performance problems.
How to Improve RACF Performance (v0.2 - 2016) from Rui Miguel Feio
]]>
1427 4 https://cdn.slidesharecdn.com/ss_thumbnails/2016gse-howtoimproveracfperformancewnv0-161102214953-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mainframe Security - It's not just about your ESM v2.2 /slideshow/mainframe-security-its-not-just-about-your-esm-v22/66958918 2016-mainframesecuritysomuchmorethanyouresmv2-161010123136
In this session we will be taking a look at some of the other security controls available to help us protect our mainframe systems. Dont be fooled by the non-mainframe folk who say the mainframe is fine, because it's behind a firewall. We will discuss and encourage debate around a number of non ESM related security controls that should/must be used to protect our mainframe systems.]]>

In this session we will be taking a look at some of the other security controls available to help us protect our mainframe systems. Dont be fooled by the non-mainframe folk who say the mainframe is fine, because it's behind a firewall. We will discuss and encourage debate around a number of non ESM related security controls that should/must be used to protect our mainframe systems.]]>
Mon, 10 Oct 2016 12:31:36 GMT /slideshow/mainframe-security-its-not-just-about-your-esm-v22/66958918 rmfeio@slideshare.net(rmfeio) Mainframe Security - It's not just about your ESM v2.2 rmfeio In this session we will be taking a look at some of the other security controls available to help us protect our mainframe systems. Dont be fooled by the non-mainframe folk who say the mainframe is fine, because it's behind a firewall. We will discuss and encourage debate around a number of non ESM related security controls that should/must be used to protect our mainframe systems. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016-mainframesecuritysomuchmorethanyouresmv2-161010123136-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this session we will be taking a look at some of the other security controls available to help us protect our mainframe systems. Dont be fooled by the non-mainframe folk who say the mainframe is fine, because it&#39;s behind a firewall. We will discuss and encourage debate around a number of non ESM related security controls that should/must be used to protect our mainframe systems.
Mainframe Security - It's not just about your ESM v2.2 from Rui Miguel Feio
]]>
831 4 https://cdn.slidesharecdn.com/ss_thumbnails/2016-mainframesecuritysomuchmorethanyouresmv2-161010123136-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cybercrime Inc. v2.2 /slideshow/cybercrime-inc-v22/66958524 gselisbon2016-cybercrimeinc-161010121948
In this session we will discuss how technology evolution has allowed syndicate criminals to become organised criminal corporations. We will be looking at how the evolution of hacking and the cyber world is putting our society at risk. This presentation will be useful for people working in IT security or anyone with interest in cybercrime.]]>

In this session we will discuss how technology evolution has allowed syndicate criminals to become organised criminal corporations. We will be looking at how the evolution of hacking and the cyber world is putting our society at risk. This presentation will be useful for people working in IT security or anyone with interest in cybercrime.]]>
Mon, 10 Oct 2016 12:19:48 GMT /slideshow/cybercrime-inc-v22/66958524 rmfeio@slideshare.net(rmfeio) Cybercrime Inc. v2.2 rmfeio In this session we will discuss how technology evolution has allowed syndicate criminals to become organised criminal corporations. We will be looking at how the evolution of hacking and the cyber world is putting our society at risk. This presentation will be useful for people working in IT security or anyone with interest in cybercrime. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gselisbon2016-cybercrimeinc-161010121948-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this session we will discuss how technology evolution has allowed syndicate criminals to become organised criminal corporations. We will be looking at how the evolution of hacking and the cyber world is putting our society at risk. This presentation will be useful for people working in IT security or anyone with interest in cybercrime.
Cybercrime Inc. v2.2 from Rui Miguel Feio
]]>
360 10 https://cdn.slidesharecdn.com/ss_thumbnails/gselisbon2016-cybercrimeinc-161010121948-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Challenges of Outsourcing the Mainframe (v1.2) /slideshow/challenges-of-outsourcing-the-mainframe-v12/65315488 challengesofoutsourcingthemainframev1-160824120124
In this presentation we discuss the challenges a company faces when the mainframe is outsourced. We will be looking at what should be considered when contemplating an outsource. Rui talks about his experience in working with companies that have been outsourced, drawing on his experience of over 10 years working for outsourcing companies.]]>

In this presentation we discuss the challenges a company faces when the mainframe is outsourced. We will be looking at what should be considered when contemplating an outsource. Rui talks about his experience in working with companies that have been outsourced, drawing on his experience of over 10 years working for outsourcing companies.]]>
Wed, 24 Aug 2016 12:01:24 GMT /slideshow/challenges-of-outsourcing-the-mainframe-v12/65315488 rmfeio@slideshare.net(rmfeio) Challenges of Outsourcing the Mainframe (v1.2) rmfeio In this presentation we discuss the challenges a company faces when the mainframe is outsourced. We will be looking at what should be considered when contemplating an outsource. Rui talks about his experience in working with companies that have been outsourced, drawing on his experience of over 10 years working for outsourcing companies. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/challengesofoutsourcingthemainframev1-160824120124-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In this presentation we discuss the challenges a company faces when the mainframe is outsourced. We will be looking at what should be considered when contemplating an outsource. Rui talks about his experience in working with companies that have been outsourced, drawing on his experience of over 10 years working for outsourcing companies.
Challenges of Outsourcing the Mainframe (v1.2) from Rui Miguel Feio
]]>
550 6 https://cdn.slidesharecdn.com/ss_thumbnails/challengesofoutsourcingthemainframev1-160824120124-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to Protect Your Mainframe from Hackers (v1.0) /slideshow/how-to-protect-your-mainframe-from-hackers-v10/65312575 howtoprotectyourmainframefromhackersv1-160824103010
This presentation addresses the requirements to protect the mainframe system from hackers. Common problems that need to be addressed, risks and mentalities that need to adapt to the new security realities. ]]>

This presentation addresses the requirements to protect the mainframe system from hackers. Common problems that need to be addressed, risks and mentalities that need to adapt to the new security realities. ]]>
Wed, 24 Aug 2016 10:30:10 GMT /slideshow/how-to-protect-your-mainframe-from-hackers-v10/65312575 rmfeio@slideshare.net(rmfeio) How to Protect Your Mainframe from Hackers (v1.0) rmfeio This presentation addresses the requirements to protect the mainframe system from hackers. Common problems that need to be addressed, risks and mentalities that need to adapt to the new security realities. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/howtoprotectyourmainframefromhackersv1-160824103010-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation addresses the requirements to protect the mainframe system from hackers. Common problems that need to be addressed, risks and mentalities that need to adapt to the new security realities.
How to Protect Your Mainframe from Hackers (v1.0) from Rui Miguel Feio
]]>
1045 6 https://cdn.slidesharecdn.com/ss_thumbnails/howtoprotectyourmainframefromhackersv1-160824103010-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IOT & BYOD The New Security Risks (v1.1) /rmfeio/iot-amp-byod-the-new-security-risks-v11 iotbyodthenewsecurityrisksv1-160824101949
In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses. In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.]]>

In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses. In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.]]>
Wed, 24 Aug 2016 10:19:48 GMT /rmfeio/iot-amp-byod-the-new-security-risks-v11 rmfeio@slideshare.net(rmfeio) IOT & BYOD The New Security Risks (v1.1) rmfeio In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses. In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iotbyodthenewsecurityrisksv1-160824101949-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In a world ever more connected to the internet, Security should be paramount. However, to keep pace with the new trends and technologies, companies and individuals, overlook the importance of security and the risks this poses. In this presentation we discuss the Internet of Things (IoT) and the concept of Bring Your Own Device (BYOD) and the security challenges and risks they can be to companies, systems, and ultimately to the mainframe.
IOT & BYOD The New Security Risks (v1.1) from Rui Miguel Feio
]]>
824 3 https://cdn.slidesharecdn.com/ss_thumbnails/iotbyodthenewsecurityrisksv1-160824101949-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Billion Dollar Product - Online Privacy (v2.2) /slideshow/the-billion-dollar-product-online-privacy-v22/65311383 2016thebilliondollarproduct-onlineprivacyv2-160824095519
Presentation discussing the erosion of online privacy. How companies and governments are utilising, misusing and selling personal data without the subjects knowledge! There is no such thing as a free ride or service. People are effectively the product. The billion dollar product. This presentation addresses how large-scale companies using mainframes believe that their data is secure and that this does not require any special attention or consideration, which ultimately leads to major risks. ]]>

Presentation discussing the erosion of online privacy. How companies and governments are utilising, misusing and selling personal data without the subjects knowledge! There is no such thing as a free ride or service. People are effectively the product. The billion dollar product. This presentation addresses how large-scale companies using mainframes believe that their data is secure and that this does not require any special attention or consideration, which ultimately leads to major risks. ]]>
Wed, 24 Aug 2016 09:55:19 GMT /slideshow/the-billion-dollar-product-online-privacy-v22/65311383 rmfeio@slideshare.net(rmfeio) The Billion Dollar Product - Online Privacy (v2.2) rmfeio Presentation discussing the erosion of online privacy. How companies and governments are utilising, misusing and selling personal data without the subjects knowledge! There is no such thing as a free ride or service. People are effectively the product. The billion dollar product. This presentation addresses how large-scale companies using mainframes believe that their data is secure and that this does not require any special attention or consideration, which ultimately leads to major risks. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/2016thebilliondollarproduct-onlineprivacyv2-160824095519-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation discussing the erosion of online privacy. How companies and governments are utilising, misusing and selling personal data without the subjects knowledge! There is no such thing as a free ride or service. People are effectively the product. The billion dollar product. This presentation addresses how large-scale companies using mainframes believe that their data is secure and that this does not require any special attention or consideration, which ultimately leads to major risks.
The Billion Dollar Product - Online Privacy (v2.2) from Rui Miguel Feio
]]>
344 13 https://cdn.slidesharecdn.com/ss_thumbnails/2016thebilliondollarproduct-onlineprivacyv2-160824095519-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber security and the mainframe (v1.3) /slideshow/cyber-security-and-the-mainframe-v13/55204944 cybersecurityandthemainframev1-151117131245-lva1-app6892
In a digital age of cloud computing and mobile systems; where cyber security, cyber crime and cyber war are part of the day-to-day vocabulary, how secure is the mainframe? Is it safe to assume that the mainframe is secure by default? Can we ignore the fact that the mainframe is just another platform in the great scheme of things? How vital is the mainframe and the data that it stores for you and your company?]]>

In a digital age of cloud computing and mobile systems; where cyber security, cyber crime and cyber war are part of the day-to-day vocabulary, how secure is the mainframe? Is it safe to assume that the mainframe is secure by default? Can we ignore the fact that the mainframe is just another platform in the great scheme of things? How vital is the mainframe and the data that it stores for you and your company?]]>
Tue, 17 Nov 2015 13:12:45 GMT /slideshow/cyber-security-and-the-mainframe-v13/55204944 rmfeio@slideshare.net(rmfeio) Cyber security and the mainframe (v1.3) rmfeio In a digital age of cloud computing and mobile systems; where cyber security, cyber crime and cyber war are part of the day-to-day vocabulary, how secure is the mainframe? Is it safe to assume that the mainframe is secure by default? Can we ignore the fact that the mainframe is just another platform in the great scheme of things? How vital is the mainframe and the data that it stores for you and your company? <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityandthemainframev1-151117131245-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> In a digital age of cloud computing and mobile systems; where cyber security, cyber crime and cyber war are part of the day-to-day vocabulary, how secure is the mainframe? Is it safe to assume that the mainframe is secure by default? Can we ignore the fact that the mainframe is just another platform in the great scheme of things? How vital is the mainframe and the data that it stores for you and your company?
Cyber security and the mainframe (v1.3) from Rui Miguel Feio
]]>
966 7 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityandthemainframev1-151117131245-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-rmfeio-48x48.jpg?cb=1636988850 Highly experienced IT consultant with in excess of 18 years experience across the Mainframe discipline and 25+ years on IT. Specialises in Security, working as a security lead and team leader in many high profile projects for major blue chip companies and government agencies around the world. Experienced public speaker having given presentations in many countries at IBM conferences, SHARE, GSE, and others, and several training classes throughout the years. Possesses an extensive knowledge in other IT platforms such as Linux, Unix and Windows. Key Technical Skills: Presenting and public speaking Security review and improvement Security audit Penetration testing Physical ... www.RuiFeio.com https://cdn.slidesharecdn.com/ss_thumbnails/2019-hackallthewaythroughfromfridgetomainframev0-190325171955-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/2019-hack-all-the-way-through-from-fridge-to-mainframe-v02/138115573 (2019) Hack All the Wa... https://cdn.slidesharecdn.com/ss_thumbnails/2017-gdprwhatdoesitmeanforthemainframev0-171130105602-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/2017-gdpr-what-does-it-mean-for-the-mainframe-v02/83047197 (2017) GDPR What Doe... https://cdn.slidesharecdn.com/ss_thumbnails/2017-cybercrimeinc-170718134439-thumbnail.jpg?width=320&height=320&fit=bounds rmfeio/2017-cybercrime-inc-v32 (2017) Cybercrime, Inc...